Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2005 Stories
-
July 20, 2005
20Jul2005
News
Pop quiz: E-mail security
Find out how much you know about securing your organization's e-mail. Continue Reading
-
July 12, 2005
12Jul2005
News
Tony Asaro: Blogs and more
Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts. Continue Reading
-
July 12, 2005
12Jul2005
News
Sarbox challenge drains security budgets
International corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum. Continue Reading
-
July 11, 2005
11Jul2005
In Depth
Business continuity: Keep on running
Too many plans for business continuity do not reflect the true risks. Sally Flood looks at risk assessment and the creation a realistic strategy. Continue Reading
-
July 11, 2005
11Jul2005
Opinion
How to win the jobs game
Many readers have been disappointed by recruitment agents. All the more reason to develop the relationship Continue Reading
-
July 06, 2005
06Jul2005
In Depth
Phishing for the missing piece of the CardSystems puzzle
A banking insider examines the ties between customized phishing attacks this spring and the CardSystems breach announced soon after. Don't miss his revelations on how they're linked and what the phishers really needed. Continue Reading
-
July 06, 2005
06Jul2005
News
This is not your father's hacker
While Sasser author Sven Jaschan awaits the outcome of his trial this week in Germany, a new cybercrime report explains why the teenager is becoming an anachronism. Continue Reading
-
July 06, 2005
06Jul2005
News
PING with Karen Worstell
The Microsoft CISO discusses how she keeps Redmond and its products secure. Continue Reading
-
July 04, 2005
04Jul2005
News
Sasser author issues courtroom confession
Sven Jaschan's mea culpa was expected after he earlier admitted to creating the last major malware outbreak more than a year ago. Continue Reading
-
June 30, 2005
30Jun2005
In Depth
Cisco in talks to acquire EMC?
Summary: Word has it Cisco is considering a $43 billion acquisition of EMC. With all the storage mergers going on, is this possible? Continue Reading
-
June 26, 2005
26Jun2005
News
Remote backup services get affordable
Remote backup services, traditionally reserved for major banks and cash-rich Fortune 500 companies, are now available to small and midsized businesses. Continue Reading
-
June 21, 2005
21Jun2005
News
Continuing education options for CISSPs: Top 10 ways to earn CPEs
Who says you can't have fun while earning CPE credits? Check out the top 10 ways to meet CISSP® and SSCP continuing professional education requirements. Continue Reading
-
June 19, 2005
19Jun2005
In Depth
How to survive a data breach
When Colin Crook offers advice on how companies should deal a security breach, he speaks from experience. He was CTO of Citicorp [now Citigroup, parent company of Citibank] 10 years ago when a hacker penetrated the company's network.
Crook... Continue Reading
-
June 13, 2005
13Jun2005
In Depth
delivering profits
-
June 13, 2005
13Jun2005
In Depth
five star reception
-
June 13, 2005
13Jun2005
In Depth
access all routes
-
June 13, 2005
13Jun2005
In Depth
B&Q boosts efficiency and cuts costs by replacing e-mail with workflow software
-
June 13, 2005
13Jun2005
News
Gartner underscores five overblown threats
Two Gartner analysts debunk five overhyped security risks they claim are causing companies to miss out on some key emerging technologies. Continue Reading
-
June 07, 2005
07Jun2005
News
Latest Mytob worms phish for trouble
Mytob's data-drumming tactics and the appearance of new Trojan horse programs add to concern that the underground is perfecting ingredients for a major attack. Continue Reading
-
June 06, 2005
06Jun2005
News
Spyware removal checklist
A step-by-step guide on how to remove spyware using antispyware tools including Spybot -- Search and Destroy, and HijackThis. Continue Reading
-
June 06, 2005
06Jun2005
News
Know your enemy: Why your Web site is at risk
In this Lesson 1 technical paper from Web Security School, guest instructor Michael Cobb outlines the threats to Web sites and who is behind them. Continue Reading
-
June 06, 2005
06Jun2005
News
Developer's active content delivery checklist
Rules for developing secure dynamic content for an IIS Web server. Continue Reading
-
June 05, 2005
05Jun2005
News
Quiz: Secure Web directories and development, answer No. 3
Quiz: Secure Web directories and development, answer No. 3 Continue Reading
-
June 05, 2005
05Jun2005
News
Quiz: Secure Web directories and development, answer No. 4
Quiz: Secure Web directories and development, answer No. 4 Continue Reading
-
June 05, 2005
05Jun2005
News
Quiz: Secure Web directories and development, answer No. 5
Quiz: Secure Web directories and development, answer No. 5 Continue Reading
-
June 05, 2005
05Jun2005
News
Quiz: Secure Web directories and development, answer No. 1
Quiz: Secure Web directories and development, answer No. 1 Continue Reading
-
June 05, 2005
05Jun2005
News
Quiz: Secure Web directories and development, answer No. 2
Quiz: Secure Web directories and development, answer No. 2 Continue Reading
-
June 05, 2005
05Jun2005
News
Analysts say 'cloudy' forecast is OK
-
June 05, 2005
05Jun2005
News
Compliance shouldn't be a primary security driver
-
June 05, 2005
05Jun2005
In Depth
Storage 911: How to troubleshoot your storage
Our emergency guide takes you through the steps you can take to prevent disaster, and then, more importantly, offers an organized list of usual suspects, from the complex to the deceptively simple. Continue Reading
-
June 05, 2005
05Jun2005
News
Quiz: Secure Web directories and development
Evaluate your knowledge of Web threats and how to defeat them. Questions cover security risks of dynamically created content and proper security management. Continue Reading
-
June 04, 2005
04Jun2005
News
Top tools for testing your online security, part 2
Michael Cobb explains what tools are helpful in maintaining Web security, including security scanners, benchmarking tools, monitoring services and online resources. Continue Reading
-
June 04, 2005
04Jun2005
News
Top tools for testing your online security
Learn a structured approach for Web security that can make your security management tasks easier and increase your chances of success. Continue Reading
-
June 04, 2005
04Jun2005
News
Life at the edge part 3: Resistance to failure
Learn how architecture, protocol and application-level protections work together to safeguard a Web infrastructure. Continue Reading
-
June 04, 2005
04Jun2005
News
Life at the edge part 4: When things go wrong
A checklist and other hints to protect your Web servers from a worst-case scenario. Continue Reading
-
June 04, 2005
04Jun2005
News
Life at the edge part 2: Divide and conquer with DMZs
Learn how a DMZ works and how it can protect Web servers. Continue Reading
-
June 03, 2005
03Jun2005
News
Quiz: Identify and analyze Web server attacks, answer No. 5
Quiz: Identify and analyze Web server attacks, answer No. 5 Continue Reading
-
June 03, 2005
03Jun2005
News
Quiz: Identify and analyze Web server attacks, answer No. 4
Quiz: Identify and analyze Web server attacks, answer No. 4 Continue Reading
-
June 03, 2005
03Jun2005
News
Quiz: Identify and analyze Web server attacks
Test your knowledge of the material covered in the "Identify and analyze Web server attacks" section of Intrusion Defense School. Continue Reading
-
June 03, 2005
03Jun2005
News
Quiz: Identify and analyze Web server attacks, answer No. 2
Quiz: Identify and analyze Web server attacks, answer No. 2 Continue Reading
-
June 03, 2005
03Jun2005
News
Quiz: Identify and analyze Web server attacks, answer No. 3
Quiz: Identify and analyze Web server attacks, answer No. 3 Continue Reading
-
June 02, 2005
02Jun2005
News
Quiz: Web attack prevention and defense
Test your knowledge of the material covered in Web attack prevention and defense, including the fundamentals of securing a Web server. Continue Reading
-
June 01, 2005
01Jun2005
News
Zombie machines used in 'brutal' SSH attacks
IT managers use SSH to gain secure access to remote computers. Hackers are using it to crack your network, with help from their zombie friends. Continue Reading
-
May 31, 2005
31May2005
News
Network configuration: IIS SMTP mail relay service and Microsoft Exchange Server
Learn how to use the IIS SMTP mail relay service to prevent spammers from directly interacting with your Microsoft Exchange Server. Continue Reading
-
May 29, 2005
29May2005
News
Patching resource kit
From vulnerability scanning to patching flubs, here's a collection of other helpful resources to ensure your patching efforts are effective. Continue Reading
-
May 23, 2005
23May2005
News
Pre-CISSP: Options for the security newbie
Shon Harris advises novice security practitioners on the value of entry-level certifications -- and good, old-fashioned experience -- in preparation for the CISSP®. Continue Reading
-
May 23, 2005
23May2005
Tip
CDP: Super snapshots -- eventually
This tip details two different definitions of CDP, the offerings from vendors in each camp and how continuous data protection differs from snapshots. Continue Reading
-
May 18, 2005
18May2005
In Depth
Controlling IT waste and redundancy through recentralization
A typical decentralized organization has many different departments such as accounting, HR, and manufacturing—all are defining and building IT infrastructures to support applications. In a decentralized environment, there is a structure in ... Continue Reading
-
May 17, 2005
17May2005
News
Should the government define spyware?
Who's best qualified to define what is and isn't spyware -- your congressman or your online user community? Security experts say no entity can do it alone. Continue Reading
-
May 17, 2005
17May2005
News
Some vendors get labeled as spyware pushers
To win the battle with spyware, you must be able to spot it. That's not as easy as you think. Continue Reading
-
May 17, 2005
17May2005
News
TNT to provide staff with e-mail smartphones rather than laptops
Logistics company TNT is to provide up to 700 staff worldwide with mobile e-mail, using the Nokia Communicator 9500 smartphone as... Continue Reading
-
May 11, 2005
11May2005
News
A new era of computer worms: Wireless mobile worms
In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm. Continue Reading
-
May 10, 2005
10May2005
In Depth
Learning Guide: Low-cost storage
Resources on low-cost networking, iSCSI, SATA and IP storage Continue Reading
-
May 09, 2005
09May2005
News
Computer Weekly wins top honour
ComputerWeekly was last week declared the UK's campaigning magazine of the year at the publishing industry's annual awards for... Continue Reading
-
April 25, 2005
25Apr2005
Opinion
Your shout: Security and skills
Have your say at computerweekly.com Continue Reading
-
April 25, 2005
25Apr2005
News
Tight contract management vital, users told at SSRG debut
The Strategic Supplier Relationships Group, which brings together 10 of the UK's most influential IT user groups, was formally... Continue Reading
-
April 25, 2005
25Apr2005
In Depth
Lead from the top
The starting line for effective data security is at board level, writes John Kavanagh in this review of current thinking and... Continue Reading
-
April 25, 2005
25Apr2005
Opinion
Seeing the big picture
Information security is about securely bringing together the organisation's two most important assets - information and people. Continue Reading
-
April 19, 2005
19Apr2005
News
LogicaCMG on Met payroll
The Metropolitan Police Authority has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration... Continue Reading
-
April 18, 2005
18Apr2005
Tip
How to use NAS gateways
What you will learn from this tip: NAS gateways are moving off the array and into the network. Here's how to manage them. Continue Reading
-
April 15, 2005
15Apr2005
In Depth
The acceptable rules of the mobile game
Mobile networks allow you to connect to your network from almost anywhere by the appropriate methodology. Yet that may also mean... Continue Reading
-
April 14, 2005
14Apr2005
News
Who should be on (and off) the hook for ID theft?
An influential cryptographer and a panel of technologists today debate how best to fight false authentication and fraudulent transactions. Continue Reading
-
April 14, 2005
14Apr2005
News
Spike ** LogicaCMG to manage Met payroll
The Metropolitan Police Authority (MPA) has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration... Continue Reading
-
April 13, 2005
13Apr2005
Tip
How to create a business continuity plan
In today's business environment, the only acceptable data loss is none at all. Find out how to create a business continuity plan that really works. Continue Reading
-
April 12, 2005
12Apr2005
News
Met Police gets LogicaCMG on payroll
The Metropolitan Police Authority (MPA) has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration... Continue Reading
-
April 06, 2005
06Apr2005
News
Seven steps to ensure project success
The Value Manager recently had a project fall well below expectations. He reviewed what happened and came up with seven key steps for managing technical risk and one golden rule. Continue Reading
-
April 05, 2005
05Apr2005
Tip
Five ways to secure iSCSI
Storage expert Stephen Foskett outlines five specific ways to secure an iSCSI SAN. Continue Reading
-
April 03, 2005
03Apr2005
News
Are identities safer on laptops than central databases?
Microsoft pledges better ID security. Given the theft of a laptop storing 100,000 Social Security numbers, Redmond's approach could prove controversial. Continue Reading
-
March 31, 2005
31Mar2005
News
External datacentre suits Selfridges
Selfridges has outsourced its datacentre and other IT functions to Retail Assist. The outsourcer will provide network management,... Continue Reading
-
March 29, 2005
29Mar2005
News
Quiz: Do you have a firm e-mail security foundation?
This Security School quiz is the first in a series of three on e-mail security essentials. Continue Reading
-
March 24, 2005
24Mar2005
News
Atos wins DWP deal extension
The Department for Work and Pensions has renewed a contract with IT services company Atos Origin to deliver medical advice and... Continue Reading
-
March 21, 2005
21Mar2005
News
Linux lags Windows in new security report
A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well. Continue Reading
-
March 21, 2005
21Mar2005
News
Home Office waits for police database case
Second Bichard report reveals concerns about a lack of progress and buy-in from forces around England and Wales for the national... Continue Reading
-
March 17, 2005
17Mar2005
News
Botnets more menacing than ever
Researchers from the Honeynet Project and iDefense say bots are spreading quickly, digging their heels into more than a million machines around the world. Continue Reading
-
March 17, 2005
17Mar2005
News
Pros and cons of remote mirroring for DR
Remote mirroring takes place over MAN or WAN distances. It's usually between storage arrays or storage appliances, and can be synchronous or asynchronous. Continue Reading
-
March 16, 2005
16Mar2005
News
RootkitRevealer turns root kits' tactics back at them
A contributor reviews freeware RootkitRevealer from Sysinternals. Continue Reading
-
March 16, 2005
16Mar2005
In Depth
Managed services: Looking to the long term
IT directors looking for an easy way to manage increasing volumes of data by buying more hardware could be storing up problems... Continue Reading
-
March 15, 2005
15Mar2005
News
ID theft and national security
Check out what some ITKnowledge Exchange members had to say about this controversial issue. Continue Reading
-
March 14, 2005
14Mar2005
News
HIPAA compliance officers explain hurdles, data security successes
@9417 Continue Reading
-
March 14, 2005
14Mar2005
News
HIPAA causes data security problems for small businesses
If your local dentist isn't complying with HIPAA's security rules, he's not alone. Experts say most doctors' offices aren't getting it. Continue Reading
-
March 14, 2005
14Mar2005
News
HIPAA security rules apply to firms with healthcare plans
-
March 14, 2005
14Mar2005
News
HIPAA security rules set hurdles for struggling hospitals
Most healthcare organizations have one more month to meet the security requirements of the Health Insurance Portability and Accountability Act (HIPAA). Will they make it? Continue Reading
-
March 14, 2005
14Mar2005
In Depth
Healthcare system designer explains HIPAA pitfalls
Kate Borten is president of The Marblehead Group Inc., has more than 20 years of experience designing, implementing and integrating healthcare information systems and is author of HIPAA Security Made Simple. This Q&A focuses on how ... Continue Reading
-
March 13, 2005
13Mar2005
News
Security Bytes: Turning servers into 'malcode pushers'
In other news, 'antispyware' company shut down during investigation and new Java Trojan hits alternative browsers. Continue Reading
-
March 13, 2005
13Mar2005
In Depth
Winning the cyber arms race in the classroom
In the struggle for cybersecurity, Lenny Zeltser's most important weapons are the classroom and the pen.
For the past few years he has taught part-time at the SANS Institute, creating a course on how to analyze malicious software... Continue Reading
-
March 09, 2005
09Mar2005
News
Exploit code targets critical CA flaws
Anyone who ever evaluated CA software is potentially at risk. The good news is patches are available and a free scanner is out now to identify systems vulnerable to attack. Continue Reading
-
March 08, 2005
08Mar2005
News
Small businesses targeted with RFID
-
March 08, 2005
08Mar2005
News
Passwords still the weakest link
Businesses are still struggling to convince their staff of the importance of password security, according to a survey of 67,000... Continue Reading
-
March 08, 2005
08Mar2005
News
A sound architecture involves both strong technology and a professional approach
Although many large organisations need to respond rapidly to changes in the market as well as to competition and globalisation... Continue Reading
-
March 07, 2005
07Mar2005
News
Windows vulnerable to LAND attack
Security researchers say this type of attack leaves enterprise customers of popular Windows products open to a denial of service. There is good news, though. Continue Reading
-
March 03, 2005
03Mar2005
Opinion
SMBs' real risk of being online
Stuart King CISSP, is responsible for online security and risk assessment for the Reed Elsevier Group. Continue Reading
-
February 28, 2005
28Feb2005
News
Leading UK firms fail the Google test
Most top UK companies are spurning search engine optimisation and pay-per-click opportunities on the web with the result that... Continue Reading
-
February 25, 2005
25Feb2005
News
Intel offers 64-bit desktop processors
Intel has introduced five processors for desktop computers using its Extended Memory Technology, EM64T, which supports hybrid... Continue Reading
-
February 25, 2005
25Feb2005
In Depth
Whisky galore with IP
Chivas can toast future success thanks to a cost-effective IP data network Continue Reading
-
February 24, 2005
24Feb2005
News
Security Bytes: Cisco patch available for ACNS flaws
Workaround outlined for new php exploit. IBM issues patch for DB2 flaw. Payroll service goes offline to investigate security claims , and BoA loses personal data on customers. Continue Reading
-
February 22, 2005
22Feb2005
News
Accommodating arrays
Modern storage arrays offer disk types to meet any need -- costly Fibre Channel (FC) disks for high-end applications requiring superior performance and availability, and lower-priced SATA disks for less-critical data. The arrays also come with mixed... Continue Reading
-
February 17, 2005
17Feb2005
News
Do you speak geek: All hail e-mail!
Test your knowledge of e-mail security with this quiz. Continue Reading
-
February 15, 2005
15Feb2005
News
Federal agency security still poor, but improving
Report cards give federal security a D-plus average, but the Homeland Security Department is still failing. Continue Reading
-
February 14, 2005
14Feb2005
News
Local mirror
-
February 14, 2005
14Feb2005
News
Local backup