Monthly Archives: October 2004

Which Security Assessment Provider?

Having identified a requirement for Security Assessment, be it an external penetration testing, security assessment or policy audit, it is vital to find an appropriate security services partner. Whether the Security Assessment is driven by an audit requirement, due-diligence or a compelling event, it is highly likely that there will be a requirement for a… Read More »

Ten things I wish they warned me about PKI

Public Key Infrastructure (PKI) has been reviewed as a technical infrastructure by a number of security experts. In this paper we look at a number of pratical organizational issues that pure PKI suppliers often fail to mention.

Tightening Wireless LAN Security

Here’s some news that will grab any information security professional’s attention: of 500 firms recently polled by Jupiter Research, less than half had implemented security solutions for their wireless networks. That’s a troubling discovery, especially given that wireless networking and mobile computing are two of the fastest growing technologies since the emergence of the Internet.