December 01, 2005 | SC Media

Print Issue: December 01, 2005

Protecting your investment in VoIP

Within the next two years, most businesses will either pilot or start widescale deployments of voice over IP (VoIP). Why? To extend the capabilities of their phone system, as well as realize significant cost savings.

Is your SAN or NAS an Achilles heel?

IT security has long been the focus of corporate attention, while storage security has been — perhaps unnoticeably — absent from the limelight. So it perhaps comes as a surprise to find that the data held in storage environments is frequently left vulnerable, simply because security in this area is so often overlooked.

10 steps to safety

So your systems have been compromised — a
distributed denial of service (DDoS) attack shut your network down or a worm infected dozens of your users’ desktop machines. Now what do you do? Here are 10 steps to help safeguard your
systems in the future.

Relying on the logs to recover

When bad things happen to good networks — and no enterprise is completely immune from attacks on its IT infrastructure anymore — how the good guys fight back can make or break the company’s ability to survive the threat.

Merger mania takes hold

With Symantec, Microsoft and Cisco continuing to buy up smaller players to bolster their product portfolios, 2005 was a boon year for consolidation in the IT security industry.

The year of compliance

At the start of the year, most of the talk centered on how IT security would be affected by new federal legislation, such as Sarbanes-Oxley and the Health Insurance Portability and Accountability Act (HIPAA). But as it turned out, it was a California state law that had the most dramatic impact.

Others who are making a difference

Richard Clarke, founder and ceo of Good Harbor Consulting, for continuing to unabashedly criticize anyone who is failing to comprehend the security requirements that go along with using the internet as a business-enabling tool. Even after his service to three presidents, Clarke serves up his cybersecurity knowledge whether your like it or not. Besides frequenting the conference circuit, he recently published a fictional account of terrorism in the U.S., The Scorpion’s Gate, slated to become a motion picture in 2007.

The top 5 inlfuential IT security thinkers

SC Magazine’s U.S. and U.K. editorial teams spotlight some of the noteworthy people, major merger/acquisitions and leading compliance worries of yet another eventful year in IT security.
With the help of our U.S. Editorial Advisory Board, we’ve focused on those eminent IT security professionals who are not only out and about around the globe bringing attention to the various issues surrounding cyberspace, but also tirelessly working to thwart cybercriminals’ attacks on organizations and private citizens. These are the players who continue to influence others in the industry and help to evolve thinking around various IT security issues and threats.

Next post in Security News