do

Head to head: Do we really need compulsory data leakage disclosure laws?

Head to head: Do we really need compulsory data leakage disclosure laws?

New privacy laws have spread across the US and could be enforced in Australia
Staff Writers Oct 29 2007 10:47AM Security
Sit back and do nothing

Sit back and do nothing

Our instinct is to fix bugs when we come across them, but sometimes that can cause more harm than good.
Nick Barron Oct 22 2007 3:00PM Security
Operator appointed for Do Not Call Register

Operator appointed for Do Not Call Register

The ACMA has announced that Melbourne-based company Service Stream Solutions has been appointed to operate and manage the national Do Not Call Register.
Staff Writers Feb 2 2007 10:38AM Telco/ISP
Court rules video games do not encourage violence

Court rules video games do not encourage violence

Somebody actually does think of the children before acting.
Iain Thomson Dec 4 2006 10:04AM Software
Laptops do a bit more on the side

Laptops do a bit more on the side

Enhanced sidescreens allow you to use your machine all day.
Martin Lynch Jul 11 2006 2:11PM Hardware
Consumers ready to do it themselves

Consumers ready to do it themselves

Shoppers want online self service to stop poor customer service.
Dave Friedlos Jul 4 2006 9:45AM Oddware
Do Not Call register fears unfounded

Do Not Call register fears unfounded

Contact centre vendor, Aspect Software, has dismissed the current concern over the proposed national Do Not Call (DNC) register legislation as a “storm in a tea cup.”

Tim Lohman Jun 8 2006 4:08PM Security
Analyst: Credit card firms must do more to fight fraud

Analyst: Credit card firms must do more to fight fraud

MasterCard’s recent move to offer financial incentives for companies using its SecureCode payer authentication system is a step in the right direction to fight online card fraud, but still "not enough," Gartner has warned.
William Eazel Jan 24 2006 10:33AM Security
Debate: The digital Mafia isn’t just hype – it really exists, and it has the power to do real damage

Debate: The digital Mafia isn’t just hype – it really exists, and it has the power to do real damage

Pete Simpson Oct 21 2005 5:21PM Security
Only a total approach will do

Only a total approach will do

John Lyons Jun 21 2005 11:50AM Security
How do you measure risk? - Tell SC Magazine

How do you measure risk? - Tell SC Magazine

What's your company's approach to risk? How do you measure it? We'd like to hear from you.
Ron Condon Apr 28 2005 1:18PM Security
Don’t do it Bill. All this will achieve is more hacking

Don’t do it Bill. All this will achieve is more hacking

In an interview last month for the BBC, Bill Gates once again stressed how seriously Microsoft is now taking security. He spoke proudly, for example, of the 100 million downloads of Service Pack 2 for Windows XP. "Users don't achieve full potential," he said, "if they're having to worry about something like security."
Robert Schifreen Mar 17 2005 3:03PM Security
Make endpoint security do what it claims it can do

Make endpoint security do what it claims it can do

Staff Writers Nov 12 2004 5:03PM Security
Do paper qualifications really prove anything?

Do paper qualifications really prove anything?

Ron Condon Nov 12 2004 4:52PM Security
Beating the social engineering scams: what employees must do to protect company data

Beating the social engineering scams: what employees must do to protect company data

While technology can dramatically reduce the risk associated with threats and vulnerabilities in enterprise IT, the human factor is always critical in a comprehensive security strategy.
John Roese Oct 27 2004 3:27PM Security
What can software asset management do for me?

What can software asset management do for me?

‘It is an irony of modern business that directors pay more attention to the control of assets such as company cars than they do to the management of business critical investments such as IT.’ So says George Cox, director of the IOD. An irony that deepens further still when you realize that many organizations spend more each year on software than they do on their vehicle fleets.
Matt Fisher Sep 29 2004 11:18AM Security
Do you already know your cyber attacker?

Do you already know your cyber attacker?

The victim of a hardware robbery decided to investigate things further when his business began to suffer. Justice was served as the culprits were caught and legal history was made. Neil Hare-Brown explains how
Neil Hare-Brown Sep 2 2004 3:18PM Security
Who do you go to for all your browsing needs?

Who do you go to for all your browsing needs?

Jon Tullett Aug 5 2004 4:18PM Security
Ingram seeks to do still more with less

Ingram seeks to do still more with less

Broad-based distributor Ingram Micro has cut 12 staff as it fights to maintain profitability in the face of ever-shrinking margins.
Fleur Doidge Jan 27 2004 12:00AM Hardware
Let’s work together like the cyber attackers do

Let’s work together like the cyber attackers do

Another New Year has begun and with it come predictions about the types of cyber attacks.
Illena Armstrong Jan 22 2004 11:19AM Security

Log In

  |  Forgot your password?