(Translated by https://www.hiragana.jp/)
CSO Homepage - The site for chief security officers & other security executives.-CSO Home Page
The Wayback Machine - https://web.archive.org/web/20071010042734/http://www.csoonline.com:80/

Locking Down America

Locking Down America

Columnist Paul Raines argues that visa restrictions and other measures come with a big price and what's good for security isn't necessarily good for America.

 

Security Blogs

Overly on Security

Virtualization and the Desktop

The Brave New World of InfoSec

Human/Network:
Accountability and Responsibility is Still the Same

Security Samurai

On (Mis)Trusting Google Desktop

Security by Numbers

The 80/20 of Managing Software Risk

Security Smack-down

People are NOT Computers

Security Renegades

Cybercrime Surpasses Illegal Drugs and Still Isn't a Big Deal

Lohrmann On GovSpace

Hacker Hits Vietnam Memorial Website

Security In the (Apple) Core

Security: Bringing Sexy Back

Enterprise Linux: Full Metal Tux

Modifying Embedded Linux Devices

Security Curmudgeon

More on TD Ameritrade (and Loans.co.uk)

Security Blanket

Cyberterrorism Exposed by the Colbert Report

Movers & Shakers

Recent moves: Verizon, University of Arizona, State of Arizona

 

Editor's Picks

5 Myths of RFID

Counterfeit

The 5 Myths of RFID

Big pharmaceutical companies' RFID trials aim to keep fake drugs out of your medicine cabinet—but the technology has significant limitations.

Full story »

Image Spam: How it Works and Why it Fools Filters

E-mail Security

Image Spam: How it Works and Why it Fools Filters

Image spam—an e-mail solicitation that uses graphical images of text to avoid filters—is not new, but recently it reached an unprecedented level of sophistication and now comprises up to 40 percent of e-mail. It is expected to keep rising. To battle it, you must understand it, and this interactive graphic can help you.

Also see »
The Scourge of Image Spam

Polymorphic Malware: A Threat that Changes on the Fly

Malicious Code

Polymorphic Malware: A Threat That Changes on the Fly

Polymorphic malware changes shape to fool detection schemes.

Full story »

How to Control Crowds in Ancient Pompeii

Crowd Control

How to Control Crowds in Ancient Pompeii

What computer models are telling us about how to manage a crowd, the ancient Romans already seemed to know. This interactive article includes a slideshow demonstrating how Pompeii Stadium architecture facilitated the flow of 30,000 spectators—and allowed it to be emptied in just 10 minutes—as well as video clips that can show us how to safely engineer spaces for large gatherings and the flow of thousands, sometimes millions, of people.

Full story »

 

Also see:

CSO Research Centers

CSO Resources/Tools

Security News

Alarmed
Internet Security as Conversation Piece

Talking about the conflagration at hand instead of fire prevention.
More>>

 

Findings of the 2007 e-Crime Watch Survey

This year’s study revealed that while security events and electronic crimes were steady against last year’s findings, there are real concerns that security executives may be becoming over confident.

See the Results

Aberdeen Security Research

CSO, in conjunction with analyst firm Aberdeen, brings you the latest security research.

Read the Reports

Assessment Tool: How Flawed Is Your Security Program?

Is Your Security Program Flawed?

Roger Johnston, leader of the Vulnerability Assessment Team at Los Alamos National Labs, developed this quiz that identifies the 28 attributes of a flawed security system. Find out how you rate with this interactive assessment tool.

Check out all our interactive tools:

Spying Scandal at Hewlett-Packard

CSO the magazine

You may qualify for a FREE subscription to our print magazine, the Resource for Security Executives

FLASH DEMO

How do you grant your IT users with single sign-on to authorized resources?

HP Identity Management makes sure that employees have secure access to the systems and applications they need to do their jobs, while preventing unauthorized access. This flash demo provides a view of both user and administration, highlighting the features of IdM through a simulated demo of use case scenarios.

WHITE PAPER

Identity Management - an evolutionary approach

Download the new HP whitepaper and learn the benefits of delivering a service-centric IdM infrastructure to automate and secure change throughout the all enterprise lifecycles: user, IT, and business. This paper breaks down the tasks of an IdM solution, discusses the need for automation and compares traditional role based vs. a service centric approach.

WHITE PAPER

How well has the Payment Card Industry (PCI) Data Security Standard (DSS) been implemented over the past 12 months?

In this Aberdeen Group report, you'll learn about obstacles companies have encountered over the past 12 months and why achieving superior protection of cardholder data requires a combination of strategic actions, business process capabilities, and enabling technologies. See how your company can achieve successful compliance today.

WHITE PAPER

Companies now view business alignment with IT as a greater driver than either compliance or security. Find out why.

In this Aberdeen Group Sector Insight, which spans five years, two million respondents, 644,000 organizations, and up-to-the-minute feedback from 3,670 survey respondents you'll gain deep insights through analysis based on industry, geography, job function, and company size. Read all the facts and recommendations for action in this information-packed report.

WHITE PAPER

Positive user experiences at financial institutions providing online banking leads to increased consumer confidence and satisfaction.

Today's consumers are understandably concerned about using the Internet due to increasing identity theft and online fraud. In this white paper, you'll learn how RSA solutions can help you put your customers at ease by providing them with assurance that their online interests are protected by effective security features.



 

 
Business Continuity: 2007 Research Brief

Business Continuity: 2007 Research Brief

Read how CIOs and other IT pros rated their companies' Business Continuity readiness.

Learn more »

Endpoint Security Virtual Conference

Register today for this free virtual conference and receive our exclusive Endpoint Security Survey to benchmark your efforts against those of your peers.

Learn more »


advertisement