The European Waste Electrical and Electronic Equipment (WEEE) directive addresses cavalier attitudes to dumping hardware. *
Download the article from:

Are we now at the mercy of anyone within wireless networking range of the wireless access points? *
Download the article from:

The flow of data is seemingly endless from the public and private institutions that are tasked with gathering, processing and safeguarding our personal information. *
Download the article from:

Keep private data safe
Author - Conor Flynn, Technical Services Director, Rits Information Security
Organisations must make sure that their clients' personal information does not make its way into the wrong hands. *
Download the article from:

Wireless security flaw revealed
Conor Flynn, Technical Services Director,
Rits Information Security
Conor Flynn gives his opinion of Wired Equivalent Privacy (WEP) security protocol to ENN.
Link to article: http://www.enn.ie/article/134452.html
Protecting the perimeter
Rits Information Security
Information security personnel are often too interested in what is happening within the perimeter of the network... *
Download the article from:

While wireless technology has revolutionised computer use, it can also leave a business open to attack. *
Download the article from:

Virtualisation
Rits Information Security
Is virtualisation the answer to server room sprawl? *
Download the article from:

SQL Injection
Rits Information Security
This month's article descibres a strange ailment that can afflict you web applications..*
Download the article from:

Personal Data Loss
Rits Information Security
Are companies keeping your data secure?
Download the presentation from:

Google - Friend or Foe?
Rits Information Security
In this month's article Conor considers the security implications of Googles undoubted success. *
Download the article from:

PCI Data Security Standard
Announcement Rits Information Security
Rits is proud to announce that it has been certified by both VISA and MasterCard to audit companies for PCI compliance.
Rits can now help Merchants and Service Providers achieve compliance with the PCI Data Security Standard.
Links:
Rits and PCI.

Mobile Phones are now being delivered with data storage. This creates a another security headache that needs to be managed. *
Download the article from:

OWASP Autumn Conference
Author - Eoin Keary Rits Information Security
Eoin Keary gives a presentations on Secure Code Review and
Penetration Testing Applications on the 17th October at the OWASP
Application Security Conference 2006 in Seattle, US.
Eoin is a member of the Application Security team in Rits and also leads
two OWASP projects: The OWASP Testing Guide project and the OWASP Code
review project.
Links:
www.owasp.org/index.php/OWASP_AppSec_Seattle_2006
www.owasp.org/index.php/Category:OWASP_Testing_Project
www.owasp.org/index.php/Category:OWASP_Code_Review_Project

A recent security disclosure related to the Apple Mac computer caused headlines. But when the dust settled what was it all about....
*
Download the article from:

Over the last couple of weeks we have been reading in the media about the dismissal of staff, and disciplinary actions taken against others as a result of allegedly pornographic emails. *
Download the article from:

Appalling Vista?
Rits Information Security
In this month's article Conor looks at the impact that the launch of Windows Vista will have on security software manufacturers. *
Download the article from:

IIA Presentation - Wireless Security
Damien Moran Rits Information Security
At the Irish Internet Association (IIA) congress, Damien Moran gave a presentation on the security implications of installing a
Wireless Network.
Download the article from:

Shell suspend Chip and Pin
Conor Flynn, Technical Services Director, Rits Information Security
Shell have suspended the use of Chip and Pin at their petrol stations in the UK after becoming the victim of fraud. Conor speaks to RTE Radio's News at One lunchtime program and outlines the background and implications of this.
Listen to the interview

Laptop Data
Rits Information Security
With increasing use of laptops and PDAs, Conor looks at some of the security implications resulting from this popularity. *
Download the article from:

Smart Cards
Rits Information Security
Smart Cards are finally coming of age. Chip and Pin technology is meant to cut down on fraud, but there are still problems. Conor looks at some of the issues which have come to light over the last few weeks. *
Download the article from:

Bad Apples
Rits Information Security
For the first time Mac users are being targeted with MalWare. This month's article offers some advice for Apple fans. *
Download the article from:

Irish Information Security Forum - IISF
Alexis FitzGerald and Eoin Keary, Rits Information Security
Alexis and Eoin gave an introduction to two components the OWASP toolset at the monthly IISF meeting held in Dublin. WebGoat is a J2ee application which teaches some fundamental application security lessons. WebScarab is a framework for analysing applications that communicate over HTTP and HTTPS protocols.
For more information on the OWASP toolset visit:
http://www.owasp.org
Predictions for 2006
Rits Information Security
This article offers some predictions on the main issues in 2006. *
Download the article from:

Rits Information Security is pleased to announce that Eoin Keary, leader of the Irish Chapter of OWASP, has joined the company. OWASP, the Open Web Application Security Project, is "dedicated to finding and fighting the causes of insecure software". The addition of Eoin will further enhance the strength of the Rits team.

Information Leakage
Author - Angela Madden, Director Information Security Services, Rits Information Security
In this article, Angela looks at the motives behind infromation leakages - whether they be accidental or otherwise, and also looks at the measures that can be taken to prevent them.
Download the article from:

Information security is playing an increasingly important role in the public sector. Conor Flynn looks at the background to this. *
Download the article from:

This months column examines the changing motives of the groups behind the development of computer malware. *
Download the article from:

Thinking about ISO17799?
Author - Angela Madden, Director Information Security Services Rits Information Security
The ISO17799 standard is playing an increasingly important role as organisations strive to improve their Information Security Management Systems (ISMS). In this short document, Angela Madden looks at the benefits that the standard can bring and the steps in implementing the standard.
Download the article from:

OWASP Presentation - WebScarab
Alexis FitzGerald, Senior Consultant, Rits Information Security
WebScarab is a handy web proxy for use in testing the security of Web Applications. Alexis gave an introduction to WebScarab at the September meeting of the OWASP Dublin chapter. OWASP is the Open Web Application Security Project
Download his presentation from:
http://www.owasp.org/docroot/owasp/misc/OWASP_WebScarab.ppt
OWASP is at :
http://www.owasp.org

The Ethics of Disclosure
Rits Information Security
Over the last two weeks, the IT world has been looking on in fascination as giants of the network and security have been locked in courtroom battles in the United States with an individual and a conference organiser. Conor Flynn looks at the background and ponders the consequences. *
Download the article from:

Malicious code for mobile phones is becoming more common. This month's column examines this trend in more detail. *
Download the article from:

Identity Sale
Rits Information Security
Over the last couple of years, there has been increased coverage of the amount of fraud that is being perpetrated as a result of identity theft. A recent twist on this is the growth of "Identity Sale." This month's article discusses this phenomonen. *
Download the article from:

New Threats in 2005
Rits Information Security
We have already seen a new raft of threats in the first three months of 2005. These include a significant increase in phishing attacks. Conor's monthly column examines these trends in more detail and discusses what the remainder of the year might bring.
*
Download the article from:

Data Classification
Rits Information Security
Data Classification is the assignment of a level of sensitivity to a information. This month's column looks at the role that Data Classfication plays and the issues that its implementation raises.
*
Download the article from:

In this article Conor discusses some of the main issues faced by small to medium sized security businesses when setting up a network and connecting to the internet.
*
Download the article from:

2004-The Year of the Virus
Rits Information Security
In this article Conor discusses the major computer virus trends which developed during the last year.
*
Download the article from:

Data Theft
Rits Information Security
Data theft is increasing due to the popularity of storage devices using various formats. This article examines issues that this trend highlights.
*
Download the article from:

This article looks at the changing nature of the internet based security threats and what measures can be put in place.
*
Download the article from:

Summer of Viruses
Rits Information Security
This article outlines the new viruses that have been rampant on the Internet during the summer of 2004, and some of the actions that these viruses and trojans perform once they have infected a machine.
*
Download the article from:

This article highlights the issues facing startup and small businesses from an Information Security perspective, and offers several recommendations to protect against these issues.
*
Download the article from:

Note! You will need the Adobe Acrobat Reader to read these articles. You can download a free copy of the Adobe
Acrobat Reader at: http://www.adobe.com/acrobat/readstep.html
* SecurityWatch article for the Computers in Business supplement of the Sunday Business Post.
|