an

Is your SAN or NAS an Achilles heel?

Is your SAN or NAS an Achilles heel?

IT security has long been the focus of corporate attention, while storage security has been — perhaps unnoticeably — absent from the limelight. So it perhaps comes as a surprise to find that the data held in storage environments is frequently left vulnerable, simply because security in this area is so often overlooked.
James Middleton Dec 15 2005 10:36PM Security
Debate: IP telephony is insecure and cannot be used in an organisation’s infrastructure just yet

Debate: IP telephony is insecure and cannot be used in an organisation’s infrastructure just yet

Tim Keanini Dec 9 2005 5:21PM Security
Messaging - is it an instant threat?

Messaging - is it an instant threat?

Instant messaging (IM) has triumphed in the past 2-3 years among personal internet users as well as within companies.
Dr. Horst Oct 3 2005 11:19AM Security
Sexually explicit mail - an office superbug

Sexually explicit mail - an office superbug

Over a third of office computer users are sending or receiving sexually explicit or racist mail, putting their companies at risk.
David Quainton Jul 25 2005 4:54PM Security
Is risk an overused buzzword?

Is risk an overused buzzword?

Peter Stephenson,CeRNS, Jun 21 2005 11:10AM Security
Try to turn SOX into an opportunity

Try to turn SOX into an opportunity

Lloyd Hession Jun 16 2005 4:36PM Security
An institute is the next step

An institute is the next step

The industry needs a body to set and monitor standards and ensure the fitness of its practitioners
Prof. Fred May 13 2005 5:18PM Security
SP2: Coming to an enterprise near you - soon

SP2: Coming to an enterprise near you - soon

Microsoft has hit back at reports businesses are shunning SP2, claiming that the current trend of uptake is very positive.
David Quainton Apr 6 2005 9:31AM Security
Fly the flag for Britain – in an international way

Fly the flag for Britain – in an international way

Without wishing to wave the Union Jack too vigorously, I couldn't help feeling a slight wave of pride at the achievements of the Jericho Forum, which is celebrating its first year of life.
Ron Condon Feb 22 2005 5:28PM Security
Is your website an easy target?

Is your website an easy target?

Working to strict deadlines and under financial constraints, website developers are often forced to place security near the bottom of the list of requirements. Marcia Savage looks at the inevitable consequences
Marcia Savage Jan 7 2005 12:38PM Security
So are these first signs of an IT user fightback?

So are these first signs of an IT user fightback?

Jon Tullett Dec 7 2004 10:36AM Security
IM: an increasing security risk

IM: an increasing security risk

Instant messaging (IM) is the fastest growing security problem facing firms today, a new survey claims. A rising number of companies are banning IM as a result of the wide-ranging security issues associated with the system.
David Quainton Nov 15 2004 6:00PM Security
Phishing: an exclusive pastime

Phishing: an exclusive pastime

Fewer than five zombie networks could be responsible for the majority of worldwide phishing, according to new research. The research, undertaken by CipherTrust, demonstrates how bot networks are increasingly used to distribute unwanted spam and phishing attacks.
David Quainton Oct 21 2004 3:22PM Security
Why every business needs an SCM strategy

Why every business needs an SCM strategy

Running a business has changed a lot over time—businesses are increasingly becoming more global in nature and constantly taking advantage of technology to help them become more efficient, cost conscious and competitive.
Zoe Lowther Oct 19 2004 5:46PM Security
Be prepared to meet an iceberg

Be prepared to meet an iceberg

“When anyone asks me how I can best describe my experience in nearly forty years at sea, I merely say, uneventful. Of course there have been winter gales, and storms and fog and the like. But in all my experience, I have never been in any accident... or any sort worth speaking about. I have seen but one vessel in distress in all my years at sea. I never saw a wreck and never have been wrecked nor was I ever in any predicament that threatened to end in disaster of any sort.” E. J. Smith, 1907, Captain, RMS Titanic
Tom Keane Oct 13 2004 11:37AM Security
Small businesses need help choosing an ISP: ACA

Small businesses need help choosing an ISP: ACA

Evaluating different offers from ISPs was the number one problem for small businesses trying to decide which choice to opt for, according to a survey conducted by the Australian Communications Authority (ACA).
Staff Writers Oct 5 2004 12:00AM Telco/ISP
Creating an ROI to justify information security budgets

Creating an ROI to justify information security budgets

The way to get the executive team to pay attention is to provide a quality ROI on any new initiative. If the boards of directors can’t understand the needs of various departments then the only way to their pocketbook is to present them with a bottom line return on their investment.
Ron Lepofsky Sep 22 2004 3:12PM Security
An orchestrated approach

An orchestrated approach

Concerto Software has acquired Rockwell First Point Contact, claiming the move will expand its global reach in the contact centre solution space.
Claire Doble Sep 16 2004 12:00AM Strategy
Keeping an eye on email monitoring

Keeping an eye on email monitoring

Organisations may need to revisit their policies on email and internet usage monitoring in light of the proposed NSW Workplace Surveillance Bill, according to industry experts.
Claire Doble Sep 7 2004 12:00AM Security
Identity Management – an industry need

Identity Management – an industry need

There is a lot of talk recently about Identity Management (IM) solutions not only within enterprises that have teams to assess the variety of technology solutions available, but also by industry analysts whose job it is to size up the IM market space, including vendors. Increasingly, IM is also becoming a key focus of discussion at industry and analyst conferences on IT security.
Rosa Caputo Aug 10 2004 4:58PM Security

Log In

  |  Forgot your password?