control

IT departments losing control of remote workers

IT departments losing control of remote workers

Study warns of 'risky online behaviour'.
Robert Jaques Nov 7 2006 11:38AM Strategy
Microsoft hands copyright control over to publishers

Microsoft hands copyright control over to publishers

Software giant begins book digitisation, but side-steps copyright problems.
Tracey Caldwell Jul 18 2006 12:45PM Software
Traffic control

Traffic control

How do you spell trust? Not I-P-S — at least, not if you're an enterprise security manager deploying an intrusion prevention system (IPS) for the first time. Once heralded as the "smarter" cousin of the intrusion detection system (IDS) — destined to eventually kick its kin out of the data center because of its "intelligent" ability to block, not just identify, security threats — the IPS instead has reached a sort of détente with the IDS. Rather than supplanting the IDS with an IPS, many enterprises use the two devices in complementary fashion.
Jim Carr Jul 10 2006 8:30PM Security
Firms fail to control World Cup access

Firms fail to control World Cup access

IT professionals are losing productivity because they are failing to control employee access to football on the internet, according to a security company.
Matt Chapman Jul 3 2006 9:20AM Security
Remote control wars

Remote control wars

Monitoring an illicit Internet Relay Chat (IRC) channel recently, Nicholas Albright couldn’t believe what he was seeing. First, he observed a network operator sending commands to install keyloggers on thousands of compromised, remote-controlled computers. Then, all this private data started flying over the channel — HIPAA-protected medical information, financial account numbers, usernames and passwords.
Deb Radcliff Jun 6 2006 7:47PM Security
Review: BindView Control Compliance Suite

Review: BindView Control Compliance Suite

The BindView Compliance Control Suite includes bv-Control for Windows, bv-Control for Internet Security and Compliance Center. This is a very complex suite of products and is part of a complete compliance and assessment toolkit that offers virtually every view necessary of the security compliance status of an enterprise. This very strength makes configuration and use of the product difficult at first.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Network Access Control market will soar to $3.9B by 2008

Network Access Control market will soar to $3.9B by 2008

Global manufacturer revenue for Network Access Control (NAC) enforcement will grow 1,100 percent, from $323 million to $3.9 billion between 2005 and 2008, new research has predicted.
William Eazel Jan 19 2006 10:01AM Security
Risk is all about keeping control

Risk is all about keeping control

Stuart Okin Oct 21 2005 4:48PM Security
U.S. air traffic control system 'open to hackers'

U.S. air traffic control system 'open to hackers'

America's air traffic control systems are open to attack from hackers and cyber-terrorists according to a new GAO report.
René Millman Sep 27 2005 12:31PM Security
Debate: Two-factor authentication access control will not prevent fraud and identity theft

Debate: Two-factor authentication access control will not prevent fraud and identity theft

Bruce Schneier May 13 2005 12:26PM Security
Take control of your security

Take control of your security

Let's face it, managing security policies can give you a headache. Coping with the rules and properties and policies affecting hundreds of devices - firewalls, intrusion prevention systems, and anti-virus servers - is hard enough, and that's before trying to manage them, or change their state.
Amit Tailor Mar 21 2005 3:18PM Security
So, friend or foe? ID management and access control

So, friend or foe? ID management and access control

Companies need to rationalize their access policies if they are to comply with the new regulations, as Charles Hayhoe explains
Charles Hayhoe Feb 21 2005 5:14PM Security
Intel to offer new chip management control

Intel to offer new chip management control

Intel is taking out-of-band technology to the chip level.

Staff Writers Dec 29 2004 9:59AM Hardware
Control what you let in

Control what you let in

Neglecting to watch what you allow into your network can create unnecessary threats, says Lance Braunstein
Lance Braunstein Dec 2 2004 5:31PM Security
Cisco boosts access control with Perfigo acquisition

Cisco boosts access control with Perfigo acquisition

Cisco Systems is preparing to acquire privately-held Perfigo, a developer of packaged network access control solutions that provide endpoint policy analysis, compliance, and access enforcement capabilities.
Robert Jaques Oct 25 2004 2:33PM Security
Chip-maker takes message control

Chip-maker takes message control

California-based company Kingston Technology recognized the security problems caused by the increased use of IM by its employees, so it took positive action to allow them to utilise the tool securely. John Sterlicchi reports
John Sterlicchi Sep 1 2004 5:01PM Security
Who is in control of Sarbanes Oxley?

Who is in control of Sarbanes Oxley?

The deadline for compliance with Section 404 of the Sarbanes-Oxley requirements (SOX) will come into force at the close of this fiscal year. Companies disclosing their results must implement an internal control structure to assure the accuracy of financial reports, evaluate the control structure periodically and make sure that controls are tested at least annually by an independent audit firm.
Luke Brown Aug 10 2004 4:52PM Security
Take control of your passwords

Take control of your passwords

The tight security at casinos needs to be extended to how the IT systems are used and accessed. John Sterlicchi reports on a case in point
John Sterlicchi Aug 5 2004 12:42PM Security
Top 10 techniques to control spam for the enterprise

Top 10 techniques to control spam for the enterprise

Spam within the enterprise has undoubtedly evolved from an annoyance to a critical business problem. No approach to spam can work in isolation as unlike viruses, no single technology is able to stem the tide. I believe that by utilising the following top ten techniques an organisation can arm itself successfully against the menace of spam.
Colin Gray Jul 13 2004 2:52PM Security
SCM Microsystems moves into physical access control

SCM Microsystems moves into physical access control

SCM Microsystems, the Californian digital security specialist, says it plans to enter the physical access control market.
Steve Gold Mar 23 2004 4:59PM Security

Log In

  |  Forgot your password?