How do you solve a problem like Web 2.0?

How do you solve a problem like Web 2.0?

The new Web means new security threats – and new ways of dealing with them. “Web 2.0 breaks what we...

April 5th, 2009 Dave Webb

Quebec police arrest 17 suspects in botnet raid

Quebec police arrest 17 suspects in botnet raid

Quebec police on Thursday said they had brought down a network of computer hackers that turned thousands of machines into...

February 21st, 2008 Jean-Francois Ferland and Kathleen Lau

Networks need internal security to be truly safe from harm

Networks need internal security to be truly safe from harm

The average medieval castle featured layers of defence. Multiple wall rings were constructed so that there was no single intrusion...

June 23rd, 2005 Daniel Briere

The e-Government Privacy/Security Continuum

The e-Government Privacy/Security Continuum

Privacy and security issues have been hearty, if time-consuming, policy dishes at the dinner table of the Lac Carling Congress...

August 31st, 2001 David Newman

Controversial security paper makes public debut

Controversial security paper makes public debut

As expected, a controversial scientific paper that describes how to disable security technology for digital audio files was publicly presented...

August 20th, 2001 Cara Garretson

IPSec

IPSec

Many network technologies have held the promise of revolutionizing and replacing existing wares. So it was with IP Security (IPSec),...

October 21st, 1999 John Curtis