Monthly Archives: October 2005

Turning Sarbanes-Oxley into a strategic Advantage

The key to turning your company’s conformity with Sarbanes-Oxley into a strategic advantage is to sustain your compliance year-on-year. To do so, you must embrace the idea that Sarbanes-Oxley compliance is an ongoing journey not a final destination.

Secure Instant Messaging, Improve Communication

Instant messaging (IM) has triumphed in the past 2-3 years among personal Internet users as well as within companies. There are now few school children not in touch with their friends via ICQ, MSN or AOL Messenger — but also stockbrokers, currency dealers, and the IT department are constantly ‘chatting’” with their most important contacts… Read More »

Carly Fiorina Joins Cybertrust board

Former Hewlett-Packard chief executive Carly Fiorina joins the board of directors of the information security company Cybertrust. The Virginia-based company provides outsourcing and technological services that address vulnerability management, compliance and identity management.

Mobile Users Push Embedded Security Applications

The growth in mobile data usage would result if device manufactures embed security applications in devices, says new survey, reflecting wireless user’s concern about the security of mobile devices and protection of data.

Anti-Spyware Group Publishes Protection Guide

The coalition of anti-spyware vendors published on Thursday spyware protection guidelines to help consumers protect themselves against various malicious programs. The alliance has also updated the definitions of spyware and adware programs.

Rise in Spear Phishing Attacks on Businesses

Spear phishing attacks are the latest technique used by computer hackers to gain access to secure enterprise networks. Unlike common phishing attacks which target millions of users, spear phishing attack is focused on one end-user or an organization at a time, and typically asks for login IDs and passwords.