Archive

Archive for October, 2004

Which Security Assessment Provider?

October 13th, 2004
Comments Off on Which Security Assessment Provider?

Having identified a requirement for Security Assessment, be it an external penetration testing, security assessment or policy audit, it is vital to find an appropriate security services partner. Whether the Security Assessment is driven by an audit requirement, due-diligence or a compelling event, it is highly likely that there will be a requirement for a third party to conduct the work.
Read more…

Articles

Ten things I wish they warned me about PKI

October 8th, 2004
Comments Off on Ten things I wish they warned me about PKI

Public Key Infrastructure (PKI) has been reviewed as a technical infrastructure by a number of security experts. In this paper we look at a number of pratical organizational issues that pure PKI suppliers often fail to mention.
Read more…

Articles

Tightening Wireless LAN Security

October 5th, 2004
Comments Off on Tightening Wireless LAN Security

Here’s some news that will grab any information security professional’s attention: of 500 firms recently polled by Jupiter Research, less than half had implemented security solutions for their wireless networks. That’s a troubling discovery, especially given that wireless networking and mobile computing are two of the fastest growing technologies since the emergence of the Internet.
Read more…

Articles