June 2009
-
June 22, 2009
22
Jun'09
Small or not, is there a niche for netbooks?
Cheap, small and easily portable, netbooks have proved the darlings of the recession-scarred consumer. They now account for a fifth of global sales... Continue Reading
-
June 22, 2009
22
Jun'09
Enterprise disk buying guide - Western Digital
We continue our reference guide to enterprise disk drives by looking at the world's number two disk vendor - Western Digital. Continue Reading
-
June 21, 2009
21
Jun'09
W-Tech 2009
One of the things that strike me as imbalanced about information security is the relatively low proportion of women entering the profession. It might be the traditional image of security as an "old ... Continue Reading
-
June 21, 2009
21
Jun'09
Unified threat management (UTM) integration challenges
The Border Gateway Protocol (BGP) is the most important protocol on the Internet, and is used to link the multiple networks that makes up the Internet. Although it performs well, it suffers from many security weaknesses. Continue Reading
-
June 21, 2009
21
Jun'09
Creating a secure platform for smart card programmers
Royal Holloway authors discuss a new architecture for trusted computing in which an existing fixed-function Trusted Platform Module (TPM) is coupled with user application code running on a programmable smartcard. Continue Reading
-
June 21, 2009
21
Jun'09
Creating an enterprise security awareness campaign
Security awareness programmes work better when everyone is involved in the process Continue Reading
-
June 21, 2009
21
Jun'09
How fuzz testing and tools can optimise testing processes
Toby Clarke and Jason Crampton make a string argument for the use of fuzzing at all stages of testing. Continue Reading
-
June 21, 2009
21
Jun'09
Computer misuse cases: Get there before the bad guys
By defining the scenarios in which computer systems could be misused, security professionals can test more thoroughly and assess risk more quickly. Continue Reading
-
June 21, 2009
21
Jun'09
Making security awareness programmes more effective
Geordie Stewart and John Austen believe we could learn a great deal by looking at marketing and psychology disciplines when setting up a security awareness programme. Continue Reading
-
June 21, 2009
21
Jun'09
How to tackle a buffer overflow attack and avoid vulnerabilities
Despite the research and learned papers on the subject, buffer overflow exploits seem to be as popular – and as successful – as ever Continue Reading
-
June 21, 2009
21
Jun'09
Fair digital rights management (DRM)
Royal Holloway authors examine the various proposals that have been made to protect digital content, and why most of them have failed. Continue Reading
-
June 21, 2009
21
Jun'09
Deperimeterization changing today's security practices
Royal Holloway authors explain how basic deperimeterization principles can ensure that security does not suffer when traditional boundaries are eroded. Continue Reading
-
June 19, 2009
19
Jun'09
Guardian exposes MPs expenses to crowdsourcing
The Guardian has launched... Continue Reading
-
June 19, 2009
19
Jun'09
Hackers help get news out of Iran
Protesters are using hackers' tools to help get the news out of Iran following the public protests over last week's presidential election, according to security...
Continue Reading -
June 19, 2009
19
Jun'09
HSBC arm is serious about social media
First Direct has launched a social media newsroom to enable customers and the bank to share information. Continue Reading
-
June 19, 2009
19
Jun'09
Place the values to unlock the secret of the pyramid
It is essential the eight selected numbers sum to exactly 45 in this case. This is because here, each number contributes twice, to two vertices, and there... Continue Reading
-
June 19, 2009
19
Jun'09
Language aside, there are gems in the Standard's 'golden skirts'
Just read: Evening Standard article 'Rise of the golden skirts' - features Steve Shirley, Martha Lane Fox, and the three C's that women aspiring to the Boardroom need to muster. Continue Reading
-
June 19, 2009
19
Jun'09
If MPs published their expenses on Twitter...
Hats off to @rogeroldham for his Twitter take on the online publication of MPs' expenses! Continue Reading
-
June 19, 2009
19
Jun'09
Vodafone maps holiday plans with Twitter
Planning your holiday? Your "staycation"? Avoid the crowds (or follow them) on Vodafone's UKHols map, a real-time guide to the most popular holiday destinations, based on Twitter feeds. Continue Reading
-
June 19, 2009
19
Jun'09
BT plots a path to cloud-based IT infrastructure
BT is planning a Virtual Data Centre (VDC) service for delivering IT services including storage, networks and security. The service is part of BT's transition...
Continue Reading