be

Be prepared to meet an iceberg

Be prepared to meet an iceberg

“When anyone asks me how I can best describe my experience in nearly forty years at sea, I merely say, uneventful. Of course there have been winter gales, and storms and fog and the like. But in all my experience, I have never been in any accident... or any sort worth speaking about. I have seen but one vessel in distress in all my years at sea. I never saw a wreck and never have been wrecked nor was I ever in any predicament that threatened to end in disaster of any sort.” E. J. Smith, 1907, Captain, RMS Titanic
Tom Keane Oct 13 2004 11:37AM Security
A problem shared could be a problem solved

A problem shared could be a problem solved

Typically, IT security professionals couldn't care less about public relations. They are too busy trying to keep their companies' computer systems securely up and running. And that particular duty is not simple.
Illena Armstrong Sep 2 2004 11:57AM Security
Why storage has to be for keeps

Why storage has to be for keeps

As the vulnerability of stored data grows, and legislation is passed to protect users, senior managers now face the threat of fines and even jail if data is lost on their watch. Failure is not an option, as Illena Armstrong reports
Illena Armstrong Aug 5 2004 1:07PM Security
Patching policies must be part of everyday practice

Patching policies must be part of everyday practice

Sarah Merrion finds that patch management requires a global, organized effort that is hardly child’s play
Sarah Merrion Apr 15 2004 10:12AM Security
Task force: Infosec must be part of corporate governance

Task force: Infosec must be part of corporate governance

A task force of the National Cyber Security Partnership (NCSP) Monday released its recommendations for organizations to incorporate cybersecurity into their corporate governance systems.
Marcia Savage Apr 12 2004 9:12PM Security
Computer Misuse Act to be reviewed

Computer Misuse Act to be reviewed

The UK’s primary computer crime law is under review for being outdated.
Dan Ilett Mar 18 2004 1:23PM Security
FBI allows name to be used on anti-piracy seals

FBI allows name to be used on anti-piracy seals

Building on its existing copyright warning appearing on VHS tapes and Region 1 DVDs, the FBI has announced it is giving DVD and software producers permission to also use its name and logo on DVDs, CDs and other digital media.
Steve Gold Feb 23 2004 5:29PM Security
Kazaa applies for Anton Piller order to be set aside

Kazaa applies for Anton Piller order to be set aside

An Australian recording industry body and Sharman Networks are in a legal wrangle, which centres around alleged copyright infringement relating to the use of the file-sharing application Kazaa.
Vivienne Fisher Feb 11 2004 12:00AM Telco/ISP
MyDoom predicted to be as bad as Sobig

MyDoom predicted to be as bad as Sobig

Security companies have predicted that the Mydoom mass mailing virus would have as large an impact as last year’s Sobig worm.
Byron Connolly , Christina Torode Jan 28 2004 12:00AM Security
Critical infrastructure companies must be mindful of infosec

Critical infrastructure companies must be mindful of infosec

Critical infrastructure companies in telecommunications, financial services, transportation and utility markets will need to heed the impact the adoption of new technologies will have on their IT security deployments and practices if they want to keep up with the vulnerabilities such upgrades often cause.
Illena Armstrong Jan 20 2004 9:16PM Security
Will the Web Ever Be Secure?

Will the Web Ever Be Secure?

If you lived your life based on what you read about crime in the daily papers, you wouldn't get out of bed in the morning.
Peter Jopling Jan 16 2004 12:55PM Security
For Mid-Sized Organizations, High Security Can Be Low Cost

For Mid-Sized Organizations, High Security Can Be Low Cost

In a tight economy, it’s easy to believe that postponing investments is fiscally responsible.
Steve Schlesinger Jan 16 2004 9:55AM Security
Will Wireless Ever Be Secure?

Will Wireless Ever Be Secure?

If wireless were simply a matter of business expedience, and we ignored security concerns, it would be as ubiquitous today as laptops and cell phones – especially for the growing number of workers who depend on mobility to do their jobs and can’t afford to be tethered to a desk, office or single location.
Arvind Krishna Jan 12 2004 12:36PM Security
Consolidation in the Security Solution Marketplace - How to be a Winner

Consolidation in the Security Solution Marketplace - How to be a Winner

Many industry experts say that the e-security market is heading towards consolidation, and that ultimately only a few dozen big vendors and niche players could remain worldwide.
Martin Gagen Jan 12 2004 10:30AM Security
Jobs: 2004 will be

Jobs: 2004 will be

Aaron Ricadela Jan 7 2004 12:00AM Training & Development
Channel could be liable for SCO copyright infringement

Channel could be liable for SCO copyright infringement

Jennifer Hagendorf Follett , Byron Connolly Jan 1 2000 12:00AM Software
Blackcomb to be phased in over time

Blackcomb to be phased in over time

Paul Thurrott Jan 1 2000 12:00AM Software

Log In

  |  Forgot your password?