Security News

Forwarded from: Anne & Lynn Wheeler http://www.garlic.com/~lynn/aepay3.htm#riskm Thread Between Risk Management and Information Security...

Forwarded from: William Knowles http://www.computerworld.com/managementtopics/roi/story/0,10801,85892,00.html Story by Doug Lewis OCTOBER 13, 2003 COMPUTERWORLD "Shut it down, now!" The guy...

http://www.computerworld.com/securitytopics/security/story/0,10801,85637,00.html Story by Bob Brewin OCTOBER 02, 2003 COMPUTERWORLD The proprietary security system used by Cisco Systems Inc. to...

http://www.computerworld.com/securitytopics/security/story/0,10801,85202,00.html Story by Jaikumar Vijayan SEPTEMBER 19, 2003 COMPUTERWORLD Five federal agencies, in collaboration with the Center...

http://www.computerworld.com/managementtopics/outsourcing/story/0,10801,84671,00.html Story by Mark Willoughby SEPTEMBER 15, 2003 COMPUTERWORLD The economics driving the globalization of IT...

http://www.smh.com.au/articles/2003/09/11/1063249516080.html By Sam Varghese September 11, 2003 Microsoft may be releasing details of vulnerabilities every week but it is yet to tackle the 30...

Forwarded from: William Knowles http://www.computerworld.com/securitytopics/security/story/0,10801,83811,00.html By Andrew Brandt PC World.com AUGUST 07, 2003 A study unveiled at the Black Hat...

Forwarded from: Mark Bernard Dear Associates, In my opinion it gets down to mapping IT/IS annual goals and objectives to business goals and objectives. But if you ask a techie how fixing the...

Forwarded from: Mark Bernard Dear Associates, If you read between the lines this story really identifies the difference between a CISSP designation and a CISM designation. One designation is...

http://www.computerworld.com/securitytopics/security/story/0,10801,82965,00.html By DAN VERTON JULY 11, 2003 Computerworld WASHINGTON -- Richard A. Clarke, the former special adviser to the...