Tag: managing

Microsoft Australia loses managing director 
By Ry Crozier | Dec 3, 2010 | Comment Now 
Replacement undecided.
Wanted: 2000 staff to join Google 
By Alexei Oreskovic | Nov 22, 2010 | Comment Now 
Some 47 staff required in Sydney alone.
Sun appoints new A/NZ MD after Bennet resigns 
Feb 4, 2009 | Comment Now 
Sun Microsystems’s A/NZ managing director Duncan Bennet has resigned “to pursue other interests”, with former director of sales Andrew Goodlace to assume the role of acting MD.
John McInerney promoted to Telstra CIO 
Nov 6, 2008 | Comment Now 
Best known for leading the IT Transformation program at Telstra, McInerney was described as “immensely capable” by CEO Sol Trujillo this morning.
Managing IT risk in unchartered waters of "Security 3.0" 
By Rosalie Marshall | Sep 21, 2007 | Comment Now 
Firms need to think about reducing spending, not throwing money at the problem, advises analyst Gartner
Managing data growth: Nine tips for mid-market organisations 
By Tim Smith | Aug 30, 2007 | Comment Now 
Small and medium sized businesses (SMBs) across Australia are struggling to manage data growth and storage costs.
Managing outbound email security threats 
By Carsten Dietrich, | Aug 17, 2007 | Comment Now 
When the subject of email security is mentioned, the first thought that comes to mind is "spam" or more appropriately "anti-spam."
Six simple steps to managing privileged passwords 
By Calum MacLeod, | Mar 13, 2007 | Comment Now 
One of today's biggest IT headaches is managing privileged passwords, the super-powerful codes such as administrator on a Windows server, Root on a UNIX server, Cisco Enable on ...
Managing information security in modern commercial environments 
By Steve Purser | Jun 15, 2004 | Comment Now 
We began this series of articles with the observation that recent advances in the area of network technology and the success of the Internet have resulted in a new business ...
Managing information security in modern commercial environments 
By Steve Purser | Jun 8, 2004 | Comment Now 
Previous articles in this series have outlined the challenges facing the present-day information security manager, presented an approach to meeting these challenges and ...
Managing information security in modern commercial environments 
By Steve Purser | Jun 1, 2004 | Comment Now 
The previous article in this series described an overall approach to securing information and provided a high-level description of the consolidation period and the strategic ...
Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach 
By Steve Purser | May 24, 2004 | Comment Now 
In the first article of this series, we identified and provided examples of the types of issues that need to be resolved if organisations are to correctly manage risk in the ...
Managing Your Security Risks: Ten Questions to Ask Before the Next Product Demo 
By Drew Williams | Jan 19, 2004 | Comment Now 
The year is still relatively young, which usually means that at some point, we all sit down either alone or with a group of trusted friends and colleagues, and make up lists of ...
Securing and Managing Electronic Messaging in the Enterprise 
Jan 15, 2004 | Comment Now 
The threats and problems posed by email in large and complex organizations are of a different type and scale of magnitude from the email problems that such organizations first ...
Managing Your Network’s Security 
By Richard Lowe | Jan 12, 2004 | Comment Now 
Network and data security is evolving.
Managing the Security of Data Flow 
By Diane Seddon | Jan 12, 2004 | Comment Now 
Customer relationship management (CRM) systems are cited as one of the major technology successes of the last decade.
Managing Passwords Without Compromising Security 
By David Kavanagh | Jan 9, 2004 | Comment Now 
Picture the scene: The 5,000 strong workforce of a multinational company are returning to work after a long and very enjoyable Christmas break and they're thinking about easing ...
Sign up to receive iTnews email bulletins
Latest Comments
Should law enforcement be able to buy and use exploits?

   |   View results
Only in special circumstances
Yes, but with more transparency