Similar Articles |
|
PC World January 2003 Andrew Brandt |
Privacy Watch: The Dangers of Do-It-Yourself Security Beware the misuse of vulnerability-testing software. |
PC Magazine August 23, 2007 John Brandon |
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
Insurance & Technology September 14, 2004 Peggy Bresnick Kendler |
Framework for Security Insurers need effective security infrastructures to withstand online threats from hackers and cyber criminals, as well as lapses by unaware internal users. |
Bank Director 2nd Quarter 2010 Glascock & Gaulke |
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. |
New Architect February 2003 Joseph C. Panettieri |
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
CIO July 14, 2008 Jarina D'Auria |
Five Things Kevin Mitnick Has Learned About Computer Security Legendary former hacker on hacking, being hacked, and companies that turn a blind eye to security. |
InternetNews October 16, 2007 Andy Patrizio |
A New Way to Hack Yourself Core Security Technologies updates its intrusion detection software to simulate outside attacks on your network and see how far the bad guys can get. |
BusinessWeek September 22, 2003 Paula Dwyer |
A Talk with William McDonough The new accounting oversight board's chairman says the profession should see the PCAOB (Public Company Accounting Oversight Board) as "its mentor-cum-ally." |
T.H.E. Journal September 2003 Roger Del Russo |
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. |
Salon.com August 29, 2001 Damien Cave |
How do you fix a leaky Net? Brian West says he was doing a public service when he pointed out a security hole in an Oklahoma newspaper's Web site. So why did the editor in chief call the cops? |
Salon.com June 5, 2002 Andrew Leonard |
A new teenage wasteland? Script kiddies, Web site defacers, chat-room gangsters: Today's digital troublemakers get a bad rap. But in "The Hacker Diaries" we learn that they're really all right. |
CIO July 15, 2001 Mark Gembicki |
The Safety Dance A freelance technology strategist answers readers' questions on security and virus protection... |
PC Magazine December 30, 2003 Matthew D. Sarrel |
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? |