Similar Articles |
|
T.H.E. Journal November 2005 Williams & Krueger |
Is Your Network Safe? Why educators should care about cybersecurity - and what they should do about it. |
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
T.H.E. Journal February 2009 John K. Waters |
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? |
CFO January 30, 2004 Esther Shein |
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. |
InternetNews April 12, 2004 Sean Michael Kerner |
Beware of Browser-based Attacks Hackers entering through holes in browsers 'may pose the next significant security threat to IT operations,' a new report warns. |
Wall Street & Technology January 5, 2005 David Tan |
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. |
PC Magazine June 22, 2004 Robert P. Lipschutz |
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
T.H.E. Journal June 1, 2010 Rama Ramaswami |
Nothing to LOL About Schools fear the predatory behavior that lurks around social networking sites can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice. |
PC World January 2003 Andrew Brandt |
Privacy Watch: The Dangers of Do-It-Yourself Security Beware the misuse of vulnerability-testing software. |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
T.H.E. Journal August 2004 Ozkan & Gunay |
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. |
PC Magazine November 29, 2006 Robert Lemos |
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. |
T.H.E. Journal October 2008 Andy McDonough |
More Is More No one solution can defend K-12 computer networks against the proliferation of digital threats. A multilayered strategy that addresses cyber safety on many fronts is a district's best hope. |
PC World April 2003 Zetter & Tweney |
Internet Fixes Sneakier spam, wilier worms, more aggravating ads... no wonder it feels like your PC is under assault. Fight back with these simple steps for keeping the latest pests at bay. |
CIO July 15, 2001 Mark Gembicki |
The Safety Dance A freelance technology strategist answers readers' questions on security and virus protection... |
InternetNews February 26, 2004 Sean Michael Kerner |
Worms Continue to Wriggle, Wreak Havoc 'Zero-day' exploits and new styles of viruses send security firms scrambling to patch the latest holes in the network. |
PC World November 2003 Andrew Brandt |
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
InternetNews March 31, 2005 Tim Gray |
Symantec Fixes Security Holes The firm releases fixes for two vulnerabilities found in its anti-virus products. |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
Global Services May 27, 2007 Raj Chaturvedi |
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. |
InternetNews January 11, 2005 Tim Gray |
Microsoft Patches Three Holes, Offers Removal Tool The company issues fixes for Internet Explorer vulnerabilities and offers a free anti-malicious software removal tool. |
InternetNews January 14, 2004 Sharon Gaudin |
Last Year's Security Problems May Balloon in 2004 If 2003 was the worst year in history for viruses and spam, hold onto your hat. This year, according to security experts, is setting up to see the malicious problems that appeared last year grow and fester into major security problems for 2004. |
PC Magazine August 17, 2005 Sebastian Rupley |
Beyond Viruses The cost to U.S. companies of doing battle with network attacks has fallen significantly. |
T.H.E. Journal August 2004 |
Total Traffic Control 5.0 This updated network security software features new tools for detecting and blocking viruses, spyware, spam and inappropriate Web content. |
CRM October 1, 2005 Marshall Lager |
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. |
Entrepreneur February 2002 Mike Hogan |
Bad Reception Employees' PDAs and portables pluck information off your wireless network all the time--now it's the hackers' turn. |
CIO April 15, 2004 Eric Knorr |
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets |
Information Today February 2001 Marshall Breeding |
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... |
Bank Systems & Technology July 5, 2004 Peggy Bresnick Kendler |
Virus Vigilance A virus can grind a bank's operations to a halt and expose billions of dollars. To really safeguard their systems, banks must implement strict security policies - and communicate them to employees and technology partners. |
InternetNews July 12, 2005 Jim Wagner |
Microsoft Patch Day Plugs 3 The fixes plug security holes in Word, IE and Windows. |
InternetNews August 5, 2004 Ryan Naraine |
Critical Flaws Spoil Opera Tune Opera updates its flagship browser to plug a series of potentially serious security holes. |
InternetNews October 11, 2004 Ryan Naraine |
Web Servers, BIND Top 2004 Vulnerabilities List The SANS institute breaks down the top 10 vulnerabilities in Windows and Unix systems. |
Entrepreneur June 2010 Ericka Chickowski |
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. |
Knowledge@Wharton September 10, 2003 |
System Alert: You've Got... Worms Was the recent spate of attacks just more of the same -- or are virus writers beginning to infect computers with other gains in mind? Experts at Wharton and elsewhere weigh in on possible motives and defenses against them. |
InternetNews May 1, 2006 David Miller |
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. |
InternetNews April 20, 2004 Ryan Naraine |
Exploit for Windows SSL Flaw Circulating Unpatched systems are at risk of DoS attacks but security experts warn the threat level could grow considerably. |
Entrepreneur January 2004 Frank J. Ohlhorst |
Hold the Fort Safeguard your networks and PCs from invasions by worms, viruses and other dangerous agents. |
T.H.E. Journal September 2005 Robert Yost |
Flexible Network Infrastructure Helps Meet District's Changing Needs IP telephony system improves student safety and staff productivity of northern Virginia district. |
PC Magazine December 30, 2003 Matthew D. Sarrel |
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? |
InternetNews January 4, 2006 Tim Gray |
RIM's Image Problem Research In Motion is warning that vulnerabilities in its BlackBerry Enterprise Server software may allow for malicious attacks. |
InternetNews November 22, 2005 Sean Michael Kerner |
Hackers Change Course A new SANS 2005 Top 20 list of Internet vulnerabilities shows a shift in what attackers are going after. And it's not just operating systems anymore. |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
InternetNews February 15, 2007 Andy Patrizio |
Another Week, Another MS Word Exploit Emerges Microsoft is investigating new public reports of "very limited, targeted attacks" against Microsoft Word. |
T.H.E. Journal January 2009 |
Flourish by Ablenet Ablenet now offers Flourish software to help teachers and administrators collect and analyze data for tracking and managing the progress of special education students. |
BusinessWeek February 19, 2007 Stephen H. Wildstrom |
Mischief-Proofing Your PC Vista comes with only some of the protection you'll need. |
OCC Bulletin May 15, 2000 |
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... |