cover

Treasury revisits cyber terrorism insurance cover

Treasury revisits cyber terrorism insurance cover

Looks to include incidents under national terrorism insurance scheme.
Justin Hendry Jul 5 2021 12:28PM Security
Treasury examines cyber terrorism insurance cover

Treasury examines cyber terrorism insurance cover

Could dump exclusions.
Ry Crozier May 1 2018 6:37AM Financial Services
EU security agency issues cloud SLA checklist

EU security agency issues cloud SLA checklist

Guidance for public sector cloud procurement.
Liam Tung Apr 4 2012 3:00PM Networking
Federal Government opens up to smaller cloud deals

Federal Government opens up to smaller cloud deals

Develops guidelines for deals worth up to $80,000.
John Hilvert Apr 3 2012 3:12PM Strategy
WIN! First photos of NBN Co manhole covers

WIN! First photos of NBN Co manhole covers

iTnews readers come through with the goods.
Staff Writers Dec 22 2010 9:45AM Telco/ISP
Sophos unveils tool to cover Windows zero-day vulnerability

Sophos unveils tool to cover Windows zero-day vulnerability

As industry waits for a patch.
SC Australia Staff Jul 27 2010 2:28PM Security
Esquire debuts electronic ink cover

Esquire debuts electronic ink cover

The American version of Esquire magazine will be trialling digital front covers in September.
Iain Thomson Jul 24 2008 9:11AM Hardware
IBM offers data centre cloud cover

IBM offers data centre cloud cover

IBM has unveiled software which it claims maximises the benefit of cloud computing and helps users automate the running of data centres..
Guy Dixon Jan 22 2008 7:05AM Hardware
Taming the Web 2.0 beast

Taming the Web 2.0 beast

Web 2.0 is cool, it may even be useful, but it is also causing a headache for those paid to worry about IT security
Staff Writers Oct 23 2007 2:46PM Security
Letter: Brighten up the cover

Letter: Brighten up the cover

My colleagues and I were wondering why the cover of SC is always pretty much exactly the same?
Staff Writers Aug 14 2006 2:44PM Security
Cover story: Coming up roses

Cover story: Coming up roses

If the online marketplace were a family, 1-800-flowers.com could be considered a patriarch. In 1992, the flower distribution business joined AOL as the internet service provider's first merchant. Three years later, the company added a ".com" to its name and became one of the web's earliest and most recognizable success stories.
Dan Kaplan Aug 8 2006 10:27PM Security
Cover Story: Working for Gold

Cover Story: Working for Gold

For all of the change that occurs in the industry, there remains one immutable consideration that every IT security manager must deal with: the justification of security costs.
Ericka Chickowski Jul 10 2006 8:48PM Security
Cover story: Hard to decipher

Cover story: Hard to decipher

The break-neck speed and frequency with which corporate data breaches are happening these days has most enterprise executives racing to avoid becoming the next headline.
Ericka Chickowski Jun 6 2006 8:13PM Security
Cover story: If once is good, twice is better

Cover story: If once is good, twice is better

A United States federal government agency didn’t need to point out the weaknesses of username and password authentication to E*Trade Financial’s CIO Greg Framke. He already knew that such an antiquated method for validating online banking customers falls short in today’s era of keyloggers and phishing scams.
Ericka Chickowski May 10 2006 8:03PM Security
Cover story: Defining trust

Cover story: Defining trust

As the mastermind of the Bali nightclub bombings awaited execution, he published a jailhouse autobiography teaching others to follow in his footsteps.
Dan Kaplan Apr 14 2006 8:14PM Security
Large enterprise: How the big boys cover their assets

Large enterprise: How the big boys cover their assets

Just one lone publicly disclosed identity theft incident can make even the largest enterprise beef up information security and privacy practices fast.
Illena Armstrong Jan 13 2006 8:27PM Security
Cover Story: Custom building defenses

Cover Story: Custom building defenses

Three IT security pros explain that a reliable network is key, no matter the size of the company.
Staff Writers Jan 13 2006 8:09PM Security
Federal law needs to cover everyone

Federal law needs to cover everyone

We've all heard about the many private companies whose lackadaisical approach to security ended in the theft of customers' critical data. But it has been rare to hear about compromises to government agencies' IT security mechanisms, which ended in a citizen's identity being compromised.
Illena Armstrong Aug 26 2005 4:50PM Security

Log In

  |  Forgot your password?