Monthly Archives: September 2003
Science Applications Intl Corp.: Looking for Lapses
Where are the weak spots in your organizations security perimeter? Is there a black market in your companys access key-cards? Is your backup data...
Ports of Entry: Fast In, Fast Out
Major U.S. ports, such as the Port of Oakland, are complex transportation systems that serve everything from recreational boats, to passenger ferries, to cruise...
American Dynamics: LAN, Camera, Action
Traditional video-security systems are known as closed-circuit television (CCTV) for a good reason: These workhorses of perimeter security typically use dedicated coaxial cable to...
Carrot and Stick: Selling Security to Shippers
U.S. Customs Commissioner Robert Bonner is trying to fight terror with a stick and a carrot.Hes telling business leaders to batten down their supply...
ADT Security Services: Spread Far and Thin
Gobble up everything in sight, and you may get indigestion. Parent company Tyco International was already collecting security firms when it bought ADT in...
FBI: Under the Gun
/zimages/7/17485.gif Darwin John had established himself as a bit of a miracle worker before being asked to lead an information- systems renaissance at the...
By the Numbers: September 2003
States vs. Cyberterror: Where is it a Crime?If information security used to be about preventing teenage hackers from breaking into corporate networks, 9/11 changed...
Gotcha! Secure Information Sharing
Did you know that:The main problem is sharing, at allSecurity and government regulations are driving law enforcement and intelligence agencies to share sensitive information...
Verizon: Reconnecting
Verizons phone cables were crushed and submerged in water after 7 World Trade Center crashed. Finally, its rehabilitation work is just about complete.By the...
Could Another SoBig Attack Be Coming This Week?
August woke people to some new antics from virus writers. As the Blaster and SoBig worms spread to millions of PCs, concerns were raised—particularly...