Tags: goodRemove, guysRemove

Mobile device management vendors in discount war 
By Brett Winterford | Aug 7, 2013 | Comment Now 
Good Technology the latest to cut prices.
 
Bank of NZ deploys mobile device management 
 
Good sues AirWatch, MobileIron for patent infringement 
By Juha Saarinen | Nov 15, 2012 | Comment Now 
Providers of BYOD solutions in legal stoush.
 
Symantec takes aim at smartphone samaritans 
Mar 14, 2012 | Comment Now 
Should you look at a lost device to identify its owner?
 
Androids creep into Apple's enterprise 
By Liam Tung | Oct 21, 2011 | Comment Now 
Put it down to consumer control.
 
Dell signs Dick Smith  
By Jenny Eagle | May 1, 2009 | Comment Now 
Dell will stock a range of products including configurations of its Inspiron 15 and Studio 15 laptops and one configuration of its Studio One 19 all-in-one desktop computer in ...
 
Good web application security requires multiple approaches 
By Sumedth Thakar | Sep 9, 2008 | Comment Now 
With new PCI DSS mandates going into effect, web application security will get even hotter.
 
Browser wars good for security 
By Ian Williams | Sep 9, 2008 | Comment Now 
The recent onslaught of Internet browsers to hit the market is a boon for user security according to Tim Callan, a product marketing executive from security firm Verisign.
 
Nanoimprint lithography makes a good impression 
By Robert Jaques | May 2, 2008 | Comment Now 
Research at the National Institute of Standards and Technology has given a boost to the emerging microcircuit manufacturing technology known as nanoimprint lithography..
 
Online security: "good enough" may not be good enough anymore 
What happens when "good enough" just isn't good enough anymore?
 
Moving data securely requires a good tool kit 
By Peter Stephenson, | Oct 25, 2007 | Comment Now 
For decades we have fussed around with how we describe our profession. It started with “data security,” evolved to “computer security,” and then took off in several directions.
 
ISF releases new good practice standard 
By Fiona Raisbeck | Oct 17, 2007 | Comment Now 
The Information Security Forum (ISF) has revised its good practice guidelines.
 
Data leaks - good intentions gone bad 
By Paul Henry, | Jul 16, 2007 | Comment Now 
Identity theft is one of the fastest growing crimes worldwide. In the US alone, identify theft happens every 79 seconds, becoming the fastest growing crime in America.
 
Philippine government seeks a few good hackers 
By Iain Thomson | Apr 23, 2007 | Comment Now 
Web-based election system to undergo 'penetration testing'.
 
CeBIT: Hard disk shredder eliminates data for good 
By Ian Williams | Mar 23, 2007 | Comment Now 
Machine turns old hard drive into confetti.
 
Protecting your company's good name outside of the network 
By Joe Sturonas, | Jan 29, 2007 | Comment Now 
Over the last several years, many well-known organisations have faced the consequences of highly publicised data breaches. These breaches directly impact an organisation's most ...
 
Good enough for your business? 
By Joe DeSantis, | Jan 24, 2007 | Comment Now 
If you're part of a financial institution, chances are you've memorised the Federal Financial Institutions Examination Council (FFIEC) guidance chapter and verse, and, with ...
 
Motorola claims good position to squash BlackBerry 
By Tom Sanders | Nov 14, 2006 | Comment Now 
Purchase of Good Technology paves way for RIM offensive.
 
Still good growth in digital cameras: Canon 
By Byron Connolly, Tim Lohman | Nov 13, 2006 | Comment Now 
Sales growth in the digital still camera (DSC) market will continue even though the market has “slowed” as it reaches maturity, according to Canon’s senior category manager ...
 
Opinion: Good night, and good luck 
By Nick Barron, | Sep 4, 2006 | Comment Now 
After the better part of ten years, Microsoft has at last announced that Windows 98 is no longer supported. As the company's least secure operating system, you might think that ...
1 2 3 | Next »
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 703

Vote