at

Second hand laptops at risk

Second hand laptops at risk

Seventy per cent of formatted second hand laptops contain retrievable data.
Dan Ilett Jun 9 2004 4:53PM Security
META: Security spending to peak at up to 12 percent of IT budgets

META: Security spending to peak at up to 12 percent of IT budgets

The average security investment will peak at eight to 12 per cent of IT budgets in the U.S. by 2006, and in Europe and the Asia Pacific region by 2007, according to report issued Monday by market-research firm META Group.
Marcia Savage Jun 7 2004 11:25PM Security
Sneak peak at new Intel chipsets

Sneak peak at new Intel chipsets

Intel's 'Grantsdale' and 'Alderwood' chipsets are still a couple of weeks away from official launch but will be 'high profile' this week at Computex, according to Intel spokesman Howard High.
Staff Writers , DVD Editor Jun 4 2004 12:00AM Hardware
Citrix talks up access infrastructure at partner event

Citrix talks up access infrastructure at partner event

Software vendor Citrix has outlined several initiatives that benefit partners and underline its move away from server-based computing to access infrastructure provision.
Fleur Doidge May 13 2004 12:00AM Software
New channel partners get Wyse at party

New channel partners get Wyse at party

Three local companies -- Volante Systems, Clariti and Logi-Tech -- have won gongs in an inaugural Australasian channel partner awards ceremony held by thin client vendor Wyse this week.
Fleur Doidge May 12 2004 12:00AM Hardware
Industry changes show at Infosec and Awards

Industry changes show at Infosec and Awards

April held this year’s Infosecurity Europe show with the usual array of security firms touting their wares and hosting discussions. Most exhibitors displayed new products and many were looking markedly happier than last year, when IT spending was in the doldrums and security spending was struggling to hold its head above water. Also interesting was the conference track (despite some spectacularly badly-designed rooms)
Jon Tullett May 6 2004 9:18AM Security
Bagle, Netsky and MyDoom feud at your expense

Bagle, Netsky and MyDoom feud at your expense

Virus writers are engaged in a to-and-fro battle resulting in misery for worm victims around the world.
Jon Tullett Mar 4 2004 12:00PM Security
Open source group fires off at SCO

Open source group fires off at SCO

Industry cluster Open Source Victoria (OSV) has filed a compliant with the Australian Competition and Consumer Commission (ACCC) against the SCO Group, in response to the vendor’s ongoing requests for licence fees from Linux users.
Staff Writers Feb 19 2004 12:00AM Software
EU reportedly looking at US$125m fine in Microsoft case

EU reportedly looking at US$125m fine in Microsoft case

Paul Thurrott Feb 6 2004 12:00AM Software
Niche apps in demand at carriers

Niche apps in demand at carriers

Telecommunications carriers want to spend more capital on software rather than hardware as demand rises for flexible service upgrades, a specialist distributor has claimed.
Staff Writers Jan 27 2004 12:00AM Telco/ISP
Is Microsoft at Odds with Best Security Practices?

Is Microsoft at Odds with Best Security Practices?

Microsoft has announced the release of a new security tool aimed at improving the security of home and enterprise systems.
David Thomason Jan 19 2004 9:52AM Security
The Right Analysis at the Right Time

The Right Analysis at the Right Time

The good news is that over the past several years, security analysis has become a widely accepted and integral part of development and deployment processes.
Brad Johnson Jan 16 2004 11:19AM Security
Survival in the Security Space: Taking a Closer Look at the Ingredients for Longevity

Survival in the Security Space: Taking a Closer Look at the Ingredients for Longevity

Today I was thinking about one-hit wonders.
Melisa LaBancz-Bleasdale Jan 16 2004 10:34AM Security
Protecting Documents and Data Shouldn’t Stop at the Server

Protecting Documents and Data Shouldn’t Stop at the Server

There are two types of companies.
Bob Brennan Jan 15 2004 1:38PM Security
Web Services: Convenience at a Price

Web Services: Convenience at a Price

We have all heard about web services.
Dick Mackey Jan 15 2004 12:20PM Security
Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level

Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level

Today’s intrusion detection (ID) technology is, for the most part, network-centric.
Andy Evans Jan 15 2004 11:45AM Security
Biometrics: Finding a niche at last

Biometrics: Finding a niche at last

As deployment of biometric technology becomes widespread, Illena Armstrong wonders if the interest is truly genuine.
Illena Armstrong Jan 13 2004 10:17AM Security
Open Source Security: Better Protection at a Lower Cost

Open Source Security: Better Protection at a Lower Cost

At first glance, the idea of using open source software for a firewall or other security application seems counterintuitive, even absurd.
Steve Schlesinger Jan 12 2004 1:02PM Security
Crackers, Hackers and Thieves - don’t make their Christmas - leave your Handhelds at home!

Crackers, Hackers and Thieves - don’t make their Christmas - leave your Handhelds at home!

Leave your laptop or personal handheld at home when you join the Christmas rush and revelry, or risk losing your mobile device and all the information which resides on it.
Magnus Ahlberg Jan 9 2004 12:39PM Security
NAB finds gold at end of CRM rainbow

NAB finds gold at end of CRM rainbow

Staff Writers Dec 9 2003 12:00AM Storage

Log In

  |  Forgot your password?