Monthly Archives: June 2001
Passing the Safe Harbor By
Dun & Bradstreet Corp. wasted no time in November when U.S. companies were given an easier way to comply with Europes tough privacy laws.The...
Virtually Insecure
In October 2000, Microsoft discovered that someone had broken into its internal network, evidently using a Trojan horse program to commandeer the PC of...
A Healthy Security Attitude
The biggest security risk to any organization comes from within. The Computer Crime and Security Survey conducted by the Computer Security Institute has found...
NATs Not Without Trouble
A network address translation (NAT) device increases security, making it more difficult for hackers to find your clients network. Couple NAT with a stateful...
Protecting the PDA
In what amounts to a 180-degree reversal, the mobile computing industry is starting to take security seriously.Certicom Corp. and F-Secure Corp. are each preparing...
The Social Engineering of Security
A few weeks ago, I was talking to the operations manager of a medium-size bank in New England. We were discussing a new commercial...
Finding Pros for IT Security
Soured economy or no, you still have to have the skills of a sleuth to find information security professionals.How bad is the dearth? Lee...
eWeek Labs Recommends: Key Security Resources
The following sites are tried-and-true security destinations. Every IT pro should bookmark and visit these sites—often.www.securityfocus.com Home of the Bugtraq mailing list archive, plus...
No Mac Is An Island
At its recent Worldwide Developers Conference, Apple Computer turned up the pressure on third-party Mac developers to expedite porting their applications to Mac OS...
Tools Keep Track of Servers
Veritas Software Corp. is rolling out several tools it says will make it easier for IT administrators to manage, monitor and maintain servers.The tools—Global...