managing

Microsoft Australia loses managing director

Microsoft Australia loses managing director

Replacement undecided.
Dec 3 2010 7:43AM
Wanted: 2000 staff to join Google

Wanted: 2000 staff to join Google

Some 47 staff required in Sydney alone.
Nov 22 2010 10:29AM
Sun appoints new A/NZ MD after Bennet resigns

Sun appoints new A/NZ MD after Bennet resigns

Sun Microsystems’s A/NZ managing director Duncan Bennet has resigned “to pursue other interests”, with former director of sales Andrew Goodlace to assume the role of acting MD.
Feb 4 2009 3:53PM
John McInerney promoted to Telstra CIO

John McInerney promoted to Telstra CIO

Best known for leading the IT Transformation program at Telstra, McInerney was described as “immensely capable” by CEO Sol Trujillo this morning.
Nov 6 2008 2:20PM
Managing IT risk in unchartered waters of "Security 3.0"

Managing IT risk in unchartered waters of "Security 3.0"

Firms need to think about reducing spending, not throwing money at the problem, advises analyst Gartner
Sep 21 2007 1:06PM
Managing data growth: Nine tips for mid-market organisations

Managing data growth: Nine tips for mid-market organisations

Small and medium sized businesses (SMBs) across Australia are struggling to manage data growth and storage costs.
Aug 30 2007 4:50PM
Managing outbound email security threats

Managing outbound email security threats

When the subject of email security is mentioned, the first thought that comes to mind is "spam" or more appropriately "anti-spam."
Aug 17 2007 11:17AM
Six simple steps to managing privileged passwords

Six simple steps to managing privileged passwords

One of today's biggest IT headaches is managing privileged passwords, the super-powerful codes such as administrator on a Windows server, Root on a UNIX server, Cisco Enable on a Cisco device, as well as embedded passwords found in applications and scripts.
Mar 13 2007 4:00PM
Managing information security in modern commercial environments

Managing information security in modern commercial environments

We began this series of articles with the observation that recent advances in the area of network technology and the success of the Internet have resulted in a new business model. This new model has resulted in a number of new challenges in the area of information security which, although largely understood, are only partially resolved. As a result, information security-related risk has been growing rapidly in the last few years and companies will need to take a more proactive stance to managing this risk in order to continue to enjoy the benefits that technological advances have made possible.
Jun 15 2004 12:09PM
Managing information security in modern commercial environments

Managing information security in modern commercial environments

Previous articles in this series have outlined the challenges facing the present-day information security manager, presented an approach to meeting these challenges and analysed the purpose of the consolidation phase in some detail. We now turn our eyes to the second phase of the approach – the strategic planning cycle.
Jun 8 2004 11:37AM
Managing information security in modern commercial environments

Managing information security in modern commercial environments

The previous article in this series described an overall approach to securing information and provided a high-level description of the consolidation period and the strategic planning cycle. We continue this development by taking a more detailed look at the consolidation period.
Jun 1 2004 12:01PM
Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

In the first article of this series, we identified and provided examples of the types of issues that need to be resolved if organisations are to correctly manage risk in the area of information security. If we combine the impact of these trends and issues with the fact that most enterprises are being forced to cut costs in order to remain competitive the true magnitude of the problem becomes apparent. Simply put, information security managers have to secure more complex environments, faster and using less resources.
May 24 2004 5:37PM
Managing Your Security Risks: Ten Questions to Ask Before the Next Product Demo

Managing Your Security Risks: Ten Questions to Ask Before the Next Product Demo

The year is still relatively young, which usually means that at some point, we all sit down either alone or with a group of trusted friends and colleagues, and make up lists of issues we intend to resolve over the course of the next 12 months.
Jan 19 2004 10:18AM
Securing and Managing Electronic Messaging in the Enterprise

Securing and Managing Electronic Messaging in the Enterprise

The threats and problems posed by email in large and complex organizations are of a different type and scale of magnitude from the email problems that such organizations first solved with an email ‘point product’ some years previously.
Jan 15 2004 10:53AM
Managing Your Network’s Security

Managing Your Network’s Security

Network and data security is evolving.
Jan 12 2004 1:00PM
Managing the Security of Data Flow

Managing the Security of Data Flow

Customer relationship management (CRM) systems are cited as one of the major technology successes of the last decade.
Jan 12 2004 11:04AM
Managing Passwords Without Compromising Security

Managing Passwords Without Compromising Security

Picture the scene: The 5,000 strong workforce of a multinational company are returning to work after a long and very enjoyable Christmas break and they're thinking about easing themselves back into the routine of work once more.
Jan 9 2004 12:47PM

Log In

Username:
Password:
|  Forgot your password?