analysis:

Analysis: Symantec outlines Security 2.0 framework

Analysis: Symantec outlines Security 2.0 framework

Marketing speak notches up the online security fear factor.
Bobby Pickering Oct 12 2006 10:06AM Security
Slow standards hurt fast wireless

Slow standards hurt fast wireless

Sales of next generation wireless networking products are being hurt by high prices and delays in approving a unified standard that will allow hardware from different manufacturers to work together, industry sources say.
Simon Burns Aug 2 2006 9:29AM Telco/ISP
Need to secure apps, data from 'Insiders' being overlooked

Need to secure apps, data from 'Insiders' being overlooked

There's lots of talk in the industry about how companies can guard against outside IT and network threats. But what can they do to shield themselves from the possibility of in-house developers, consultants, testers and other tech-savvy "insiders" entering malicious code or gaining access to live data?.
Mario Morejon Jul 21 2006 10:05AM Software
CFO responsibility to fund log analysis for Sarbanes-Oxley compliance

CFO responsibility to fund log analysis for Sarbanes-Oxley compliance

Corporations responsible for complying with Sarbanes-Oxley, face great hurdles with a basic compliance objective: analysis of their (server and security device) event logs. Some do not for lack of awareness, and others because of the difficulty (and cost) of performing the analysis. Further, issuers erroneously place the cost burden of SOX compliance on the IT security department, when the costs should be borne by the CFO’s SOX compliance budget.
Ron Lepofsky Dec 15 2004 12:27PM Security
Risk analysis is revisited with a fresh approach

Risk analysis is revisited with a fresh approach

Peter Stephenson Nov 12 2004 5:04PM Security
The Right Analysis at the Right Time

The Right Analysis at the Right Time

The good news is that over the past several years, security analysis has become a widely accepted and integral part of development and deployment processes.
Brad Johnson Jan 16 2004 11:19AM Security
Using File Hashes to Reduce Forensic Analysis

Using File Hashes to Reduce Forensic Analysis

The "hashkeeper" paradigm or model was first introduced a number of years ago by Brian Deering of the National Drug Intelligence Center (www.hashkeeper.org).
Dan Mares Jan 14 2004 1:27PM Security
Business Impact Analysis: the Starting Block for Business Continuity

Business Impact Analysis: the Starting Block for Business Continuity

What is a business impact analysis (BIA)?
Phil Carter Jan 12 2004 3:07PM Security
News analysis: Williams tackles IT portfolio

News analysis: Williams tackles IT portfolio

In a pre-election cabinet reshuffle, Prime Minister John Howard has put former Attorney-General Daryl Williams in charge of IT. But what are Williams’ views about taking on the new role?
Siobhan Chapman Nov 3 2003 12:00AM Strategy

Log In

  |  Forgot your password?