can't

Democrats can't run Linux

Democrats can't run Linux

The U.S. Democratic Party has been touting its IT credentials as proof that it is a better bet than luddite John McCain who has never turned on a computer.
Nick Farrell Aug 27 2008 7:46AM Software
Boeing to ensure 787's flight control system can't be hacked by passengers

Boeing to ensure 787's flight control system can't be hacked by passengers

The US Federal Aviation Administration (FAA) is requiring Boeing to make sure that computers governing flight control systems on the new 787 are not vulnerable to hacking from passengers using in-flight internet access.
Jack Rogers Jan 8 2008 4:05PM Security
Opinion: Who says you can’t get ITIL out of the box?

Opinion: Who says you can’t get ITIL out of the box?

Reduce consulting, speed implementation, and facilitate documentation with out-of-the-box solutions.
Ken Turbitt Jun 12 2007 11:15AM Strategy
IBM: Trivoli Storage Manager flaws can't be exploited

IBM: Trivoli Storage Manager flaws can't be exploited

Multiple buffer overflow vulnerabilities in IBM Tivoli Storage Manager (TSM), disclosed Monday by a security firm, cannot be exploited to compromise a user's system, Big Blue said today in an advisory.
Dan Kaplan Dec 5 2006 9:55PM Security
SonicWALL: Users can't consistently identify phishing messages

SonicWALL: Users can't consistently identify phishing messages

A recent test showed that the majority of computer users were unable to distinguish fraudulent emails from legitimate messages when put to the test.
Ericka Chickowski Sep 1 2006 12:24AM Security
Backup tapes can't be neglected

Backup tapes can't be neglected

In 2005, storage security losses frequently garnered a storm of media attention, with one organization losing computer backup tapes with personal information on current and former employees. In another instance, a financial services organization lost several backup tapes, with records detailing the financial information of government employees because an overnight shipping company lost their tapes.
Peter Elliman May 10 2006 7:59PM Security
We can’t be quite so open any more

We can’t be quite so open any more

a recent article about the growing fear of identity theft reminded me of a recent incident involving one of my colleagues, a hospital doctor. Let’s call him John Smith, and his workplace Greater Manchester Hospital.
Brian Shorten, Feb 10 2006 5:02PM Security
You can’t stop IM so learn to love it

You can’t stop IM so learn to love it

Instant messaging is the future, says Jim Carr, and there is a world of possibility waiting out there. But there is risk as well as benefit, and it must be faced
Jim Carr May 12 2005 4:36PM Security
Can’t see the wood for the trees?

Can’t see the wood for the trees?

As CISOs, we have to play a long game, focusing on longer-term investments in security that might take years to mature, but will make our businesses ultimately more secure. And the longest game I play is with security monitoring.
John Meakin, Apr 19 2005 11:31AM Security
Builders can’t always fix it

Builders can’t always fix it

As the pressure increases to get vital security fixes out in double-quick time, so do mistakes, says Gunter Ollmann
Gunter Ollmann Apr 19 2005 10:53AM Security
Can-Spam can't can AOL spammer

Can-Spam can't can AOL spammer

The saga of the 24 year old West Virginian AOL staffer who stole over 30 million email addresses has taken another exciting twist.
David Quainton Dec 22 2004 11:51AM Security
This government can’t keep pointing fingers

This government can’t keep pointing fingers

The Department of Homeland Security (DHS) was one of eight federal agencies that scored an F on the most recent Federal Computer Security report card. That's scary and funny all at once.
Illena Armstrong Feb 12 2004 5:54PM Security
We can’t live in a risk-free world...

We can’t live in a risk-free world...

... but we can plan to reduce the impact of things going wrong. Andy Coote assesses the various techniques professionals can use
Andy Coote Jan 22 2004 11:37AM Security
Why Can’t Our Guys Do This?

Why Can’t Our Guys Do This?

When computer forensics is an essential component of an internal investigation, lack of familiarity with the legal and technical issues involved can prompt management to assign that component to its management information security staff.
Stevens R. Jan 9 2004 4:46PM Security
Many SMBs can’t integrate apps: survey

Many SMBs can’t integrate apps: survey

Staff Writers Oct 21 2003 12:00AM Software

Log In

  |  Forgot your password?