Tags: 2008Remove, gartnerRemove, wwfRemove

Microsoft updates Windows 7 and Server 2008 
By Eric Doyle | Oct 28, 2010 | Comment Now 
Release candidates include new features and fixes.
Civilians cyberattacked Georgia in 2008 war 
By Chuck Miller | Aug 19, 2009 | Comment Now 
Attacks on Georgian government websites during the 2008 war with Russia were carried out by civilians - with little or no direct involvement on the part of the Russian ...
Innovators for 2008  
By Peter Stephenson,CeRNS, | Dec 15, 2008 | Comment Now 
This year, we took a look in the rearview mirror and observed a lot of convergence, but despite this trend interesting companies still flourish, says Peter Stephenson, ...
2008: A year of cybercriminal innovation 
By Angela Moscaritolo | Dec 5, 2008 | Comment Now 
With the emergence of new attack techniques and the reinvention of old ones, 2008 has been a year of cybercriminal innovation.
‘Cavalier’ Google burning enterprise Apps bridge 
By Ry Crozier | Nov 13, 2008 | Comment Now 
Google’s strategy of sneaking its hosted applications into enterprise environments without the knowledge of IT appears to be working, but its ‘cavalier’ attitude to the ...
Good green vendors are hard to find 
By Ry Crozier | Nov 13, 2008 | Comment Now 
HP, Fujitsu and IBM have topped one of the world’s first in-depth studies into the actual green credentials of ICT suppliers, as many of their counterparts were publicly named ...
Power reduction could bite you: Gartner 
By Ry Crozier | Nov 12, 2008 | Comment Now 
Data centre managers should be wary of committing to a long-term total reduction in the centre’s power as part of green initiatives, Gartner has warned.
Gartner warns of IT budget shortfalls in Australia 
By Ry Crozier | Nov 11, 2008 | Comment Now 
Anyone expecting a magical silver bullet from Gartner to help them ride out the current economic turmoil might have to look elsewhere for it, if the first day of the 2008 ...
Write hardware consolidation into purchase contracts 
By Ry Crozier | Nov 11, 2008 | Comment Now 
Losing one of the remaining four large server vendors in a HP-Compaq styled merger could adversely impact current competitive pricing, Gartner has said.
Analytic tools boost WWF fundraising  
By Angelica Mari | Nov 10, 2008 | Comment Now 
The World Wildlife Fund (WWF) is extending the use of business intelligence (BI) tools and implementing more web innovation to better use data about charitable donors.
Telstra cans Terria debate 
By Ry Crozier | Nov 4, 2008 | Comment Now 
Telstra is at the centre of a new storm amid allegations that it pulled out of tomorrow’s NBN debate after a failed last-minute attempt to oust the Competitive Carriers ...
CynapsPro Suite 2008 
By Justin Peltier | Oct 15, 2008 | Comment Now 
CynapsPro Suite 2008 is another tiered protection mechanism.
2008 physics Nobel Prize awarded 
By Emma Hughes | Oct 8, 2008 | Comment Now 
The 2008 Nobel Prize for Physics is shared by three scientists for unique discoveries in sub-atomic particles the prize committee announced today.
Malware soars in first half of 2008 
Jul 18, 2008 | Comment Now 
The amount of web-based malware blocked by IT security firm ScanSafe has jumped by 278 per cent in the first six months of this year.
Intel gaining ground in 2008 
By Shaun Nichols | Jul 3, 2008 | Comment Now 
Intel has continued to dominate the processor market in 2008, according to analysts..
Google kicks off 2008 Code Jam 
By Shaun Nichols | Jun 19, 2008 | Comment Now 
Google has officially opened its 2008 Code Jam programming competition..
Network forensics (2008) 
By Peter Stephenson, | May 26, 2008 | Comment Now 
This is a multi-faceted area, and combining several single-function tools with more general solutions may be the best way to cover all bases. Peter Stephenson looks at a ...
Media forensics (2008) 
By Justin Peltier | May 12, 2008 | Comment Now 
Computer forensics tools have evolved into several specialised strands as data is stored on a wider variety of devices, from PCs to mobile phones and PDAs. Justin Peltier reports
Application vulnerability assessment tools 
Tools that assess the vulnerability of the application infrastructure are gaining momentum thanks to ever increasing threats and compliance demands. Nathan Ouelette takes a ...
Infosec: Malware to grow tenfold in 2008 
By Ian Williams | Apr 24, 2008 | Comment Now 
The number of online threats will have grown tenfold by the end of 2007, according to researchers at anti-malware firm Kaspersky..
1 2 3 4 | Next »
Sign up to receive iTnews email bulletins
Latest Comments
Should law enforcement be able to buy and use exploits?

   |   View results
Only in special circumstances
Yes, but with more transparency