Data security will be the focus next year

Regulatory requirements and increasing consumer concerns about information security breaches are making data-level security controls a top priority for 2007, according to IT managers at the Computer Security Institute (CSI) trade show in

Published on: November 12th, 2006 Jaikumar Vijayan

Fending off foes

To keep danger at bay and prevent the daily nightmarish stories, threats and viruses from materializing, companies don't have any choice but to tighten up their security, says Gord Bradshaw, manager of Technical

Published on: September 11th, 2003 Susan Maclean

Cisco updates certifications, adds security training

Cisco Systems Inc. this week introduced education programs for designing network security architectures and updated certification tests for specific Cisco security gear. The two courses are "Designing Perimeter Security" and "Designing VPN Security,"

Published on: June 17th, 2003 Phil Hochmuth

Canada called a

Canada is one of just a handful of countries where Internet attacks against enterprises originate from, according to a recent security report.Alexandria, Va.-based Riptech Inc., a security services company, recently released results of

Published on: August 31st, 2002 Jeff Wilson

Canada called a base for corporate Internet attacks

Canada is one of just a handful of countries where Internet attacks against enterprises originate from, according to a new security report.Alexandria, Va.-based Riptech Inc., a security services company, recently released results of

Published on: July 25th, 2002 Jeff Wilson

Canada origin for corporate Internet attacks

Canada is one of just a handful of countries where Internet attacks against enterprises originate from, according to a new security report.Alexandria, Va.-based Riptech Inc., a security services company, recently released results of

Published on: July 16th, 2002 Jeff Wilson

Canada origin for corporate Internet attacks

Canada is one of just a handful of countries where Internet attacks against enterprises originate from, according to a new security report.Alexandria, Va.-based Riptech Inc., a security services company, recently released results of

Published on: July 16th, 2002 Jeff Wilson

Windows NT/2000 hole can let attacker take over systems

A recently discovered security vulnerability in a software debugging component of Microsoft Corp.'s Windows NT and 2000 operating systems can allow an attacker to elevate their privileges on a system and take the

Published on: March 27th, 2002 Sam Costello IDG News Service

You can be a hacker, too

According to security experts, hacking is becoming easier to both do and learn."Four or five years ago if you wanted to hack you had to have three things: you had to have knowledge

Published on: March 25th, 1999 Kimberly Chapman