101,425 Results for:

  • Sort by: 

Combining technology and social engineering: Hacking behind bars

27 Jul 2005

In this excerpt from Chapter 11 of "The Art of Deception: Controlling the Human Element of Security," authors Kevin Mitnick and William L. Simon begin a story that shows how social engineering can be used with ... Read More

Sarbox draining corporate security budgets

21 Jul 2005

Corporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Read More

Pop quiz: E-mail security

20 Jul 2005

Find out how much you know about securing your organization's e-mail. Read More

Sarbox challenge drains security budgets

By Antony Savvas 12 Jul 2005

International corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum. Read More

ControlGuard targets rogue devices

05 Sep 2006

ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used. Read More

Fast Guide: VoIP encryption

06 Sep 2006

A guide to encryption within VoIP networks Read More

Dell and EMC: Five more years

12 Sep 2006

Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ. Read More

Dundee to teach ethical hacking BSc

By Tash Shifrin 26 Jun 2006

A degree in ethical hacking will be on offer at a Scottish university from the new academic year. Read More

Automated provisioning quiz

16 Jul 2006

Take this five-question quiz to see how much you've learned about automated provisioning. Read More

How do I establish recovery priority for my applications?

24 Aug 2006

If it's at the IT level, it comes from a data perspective. When you start moving up a little bit into the business side, people start looking at the applications because they don't really know where the data is. If... Read More