HomeCybersecurity

Cybersecurity

Intelligence Agency Thinks Thin

Secure access to information is vital when it comes to Department of Defense intelligence data. This is why the Defense Intelligence Agency—a DOD combat support...

Needed: Sane Intellectual Property Laws

Intellectual property regulation in the United States is out of control. The thicket of legislation, policy and precedent through which we grant private monopolies...

Compliance Conundrum

Just as security became an issue no organization could ignore, so, too, has compliance come to infiltrate the hearts and minds of IT managers...

Readers Call for Vision; Disagree on USB Security

Mail call. Time to dip into the e-mail bag and let the readers talk back to the writer. The two columns that have drawn...

Drug Agency Finds Safe Harbor for Critical Data

IT folk in corporate America spend many a sleepless night fretting over network security and how to prevent denial-of-service attacks or downtime that can...

Levi Strauss Tries on RFID for Size

Levi strauss, one of the nations largest clothing manufacturers, confirmed April 28 its testing of RFID "hang tags" on clothing shipped to two retail...

IT Leaders Rattle Security Nerves

The it industrys largest players keep baking more defense features into their products—a trend that could accelerate the rapid shifts in a market experts...

Symantec Touts Anti-Phishing

Symantec is relaunching the anti-phishing industry group gained via its 2005 acquisition of WholeSecurity and is promising to sign on some well-known participants, in...

Theres Still Life in the Post-Vista Security Aftermaket

Every new version of Windows brings with it fears about which software aftermarket will get steamrolled by a new Windows feature. The big questions...

Check Point Pitches UTM Security for Enterprises

Check Point Software Technologies introduced its newest package of enterprise security applications on May 8, rolling out new capabilities for using so-called unified threat...