Tag: how

Analysis: How four big Aussie companies went Agile 
By Stephen Withers | Sep 17, 2010 | Comment Now 
NBN Co, Suncorp, Allianz, Jemena take the plunge.
 
How to avoid flaws in identity management 
By David Bell | Sep 13, 2010 | Comment Now 
IT managers need a secure and cost-effective approach to identity and access management, as NetIQ's David Bell explains.
 
Network Solutions refutes reported scale of malware issue 
By Angela Moscaritolo | Aug 19, 2010 | Comment Now 
Claims only 120,000 domains affected.
 
How can you be confident when the endgame stakes are increasing? 
 
iTnews asks: Dress up or down for an IT job interview? 
By Ry Crozier | Mar 26, 2010 | Comment Now 
Suit and tie versus shorts and t-shirt.
 
Analysis: How secure is an optical-fibre network? 
By Dave Bailey | Aug 7, 2009 | Comment Now 
What IT leaders should consider.
 
How to succeed as an interim IT manager  
By Simon Berry | Jun 19, 2009 | Comment Now 
Working on a short-term contract can be challenging.
 
Opinion: How SMEs can implement tailored IT systems 
By Tim Harmon, | Feb 4, 2009 | Comment Now 
Too often, small and medium-sized enterprises (SMEs) do not take responsibility for educating themselves sufficiently about technology, instead putting their trust in technology...
 
How to deploy secure unified communication  
By Computing staff | Jan 23, 2009 | Comment Now 
There is an uneasy tension between the concepts of unified communications (UC) and IT security.
 
How new access control technologies can address insider threats 
By Rich Campagna | Jan 13, 2009 | Comment Now 
Open networks and fast-moving data allow errors and malfeasance by network insiders to create significant financial, public-relations and regulatory risks, says Juniper's Rich ...
 
No fear factor: How to make role management work for the enterprise 
By Deepak Taneja | Dec 3, 2008 | Comment Now 
There are three key objectives to keep in mind for determining the success of any roles-based access and identity management initiative, says Deepak Taneja.
 
Case study: How Smartpath got into NEC SaaS ‘supermarket’ 
By Ry Crozier | Nov 18, 2008 | Comment Now 
Local asset management ISV Smartpath is using NEC’s Applications Net to deliver its Loc8 software as a hosted offering to customers.
 
AMD vs Intel - How Shanghai shapes up 
By Sylvie Barak | Nov 17, 2008 | Comment Now 
A couple of days ago we were alerted to what we were told was a Shanghai SAP score for an eight-socket machine, which looked to come in a full 30 per cent lower than the ...
 
Just how harmless is Yahoo Fire Eagle? 
By Rosalie Marshall | Aug 18, 2008 | Comment Now 
The launch of Fire Eagle may appear a harmless new addition to a growing group of interactive web applications but the consequence of a widespread take-up of the application ...
 
CIOs confused over how to calculate carbon footprint 
By Rosalie Marshall | Aug 11, 2008 | Comment Now 
Fujitsu Services survey finds lack of advice on what CIOs should be included in carbon footprint.
 
Opinion: How to survive the Government ICT review 
By Dylan Bushell-Embling | Jul 10, 2008 | Comment Now 
The Whole of Government [WoG] ICT review to be conducted by Sir Peter Gershon has the potential to significantly cut costs and increase efficiency. But an Ovum analyst warns it ...
 
How exposed are you? 
By Ken Munro | May 22, 2008 | Comment Now 
Social networking sites are a security minefield, so we have created some exercises to test for vulnerabilities.
 
How IT security could go green? 
By Sylvie Barak | May 16, 2008 | Comment Now 
THE CHAIRMAN OF Wick Hill Group in the UK, which sells security infrastructure for ebusiness, has written a whitepaper outlining his views on how IT security could become more ...
 
Hannaford tells regulators how breach happened 
By Dan Kaplan | Apr 2, 2008 | Comment Now 
Hackers used sophisticated methods to evade detection and place malware on nearly 300 Hannaford Bros. store servers to intercept payment information during the credit card ...
 
Going solo: How to be a security consultant 
By Mark Mayne | Mar 27, 2008 | Comment Now 
We all dream of being our own boss, but what does it take to set up a successful business in the real world? Mark Mayne has some advice.
1 2 3 4 | Next »
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1064

Vote