101,425 Results for:
- Sort by:
Combining technology and social engineering: Hacking behind bars
27 Jul 2005In this excerpt from Chapter 11 of "The Art of Deception: Controlling the Human Element of Security," authors Kevin Mitnick and William L. Simon begin a story that shows how social engineering can be used with ... Read More
Sarbox draining corporate security budgets
21 Jul 2005Corporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Read More
Pop quiz: E-mail security
20 Jul 2005Find out how much you know about securing your organization's e-mail. Read More
Sarbox challenge drains security budgets
12 Jul 2005International corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum. Read More
ControlGuard targets rogue devices
05 Sep 2006ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used. Read More
Dell and EMC: Five more years
12 Sep 2006Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ. Read More
Dundee to teach ethical hacking BSc
26 Jun 2006A degree in ethical hacking will be on offer at a Scottish university from the new academic year. Read More
Automated provisioning quiz
16 Jul 2006Take this five-question quiz to see how much you've learned about automated provisioning. Read More
How do I establish recovery priority for my applications?
24 Aug 2006If it's at the IT level, it comes from a data perspective. When you start moving up a little bit into the business side, people start looking at the applications because they don't really know where the data is. If... Read More