HomeCybersecurity

Cybersecurity

Holes in Wireless Nets

That the latest security land mine facing it managers has been found among existing wireless networks shouldnt come as a surprise. After all, the...

Whats @stake For Security Services

As the world of managed security grows, Christopher Darby, CEO of @stake Inc., in Cambridge, Mass., has decided to play the cards he was...

One-Stop Security?

IT managers looking for one-stop security shopping may soon have more superstores to visit. But whether that will mean a more secure enterprise is...

Watch Your Step

Ohms Law. Moores Law. Parkinsons Law. Theyre all critical to running a high-technology enterprise. But the most important law, by far, when it comes...

Self-Assess, Then Get Advice

Before calling in the experts to perform a vulnerability assessment of an enterprise network, there are a few basic steps IT managers can take...

Keeps Its Eye on Network Edge

If nothing else, the emergence of the Anna Kournikova virus that wreaked havoc on so many computers earlier this month may make small to...

Consultants: Cant Live With Em, Cant …

In the future, only ignorant companies will keep their IT security teams completely in-house. And those ignorant companies will become the first to collapse...

Protecting Your Privacy

Some months back I wrote about the phenomenon of privacy on the Internet. I say "phenomenon" because thats what it is, a notion whose...

Denial of Death Benefits

There is reason today for great celebration throughout computer land. Users, developers and hardware manufacturers should be popping corks and shouting from the rooftops....

Giving Users the Final Word

Keeping a low profile is getting a lot of attention from legislators in a pair of online privacy measures aimed at protecting consumers personal...