how

CrowdStrike promises more testing of security content updates

CrowdStrike promises more testing of security content updates

File that crashed Windows machines worldwide mistakenly passed validation.
Ry Crozier Jul 24 2024 3:50PM Security
Analysis: How four big Aussie companies went Agile

Analysis: How four big Aussie companies went Agile

NBN Co, Suncorp, Allianz, Jemena take the plunge.
Stephen Withers Sep 17 2010 7:21AM Software
How to avoid flaws in identity management

How to avoid flaws in identity management

IT managers need a secure and cost-effective approach to identity and access management, as NetIQ's David Bell explains.
David Bell Sep 13 2010 4:57PM Security
Network Solutions refutes reported scale of malware issue

Network Solutions refutes reported scale of malware issue

Claims only 120,000 domains affected.
Angela Moscaritolo Aug 19 2010 12:59PM Security
How can you be confident when the endgame stakes are increasing?

How can you be confident when the endgame stakes are increasing?

IT personnel need to take more of an integrated approach.
Devin Anderson, product line manager for Security Suite, Jun 28 2010 11:21AM Security
iTnews asks: Dress up or down for an IT job interview?

iTnews asks: Dress up or down for an IT job interview?

Suit and tie versus shorts and t-shirt.
Ry Crozier Mar 26 2010 2:16PM Training & Development
Analysis: How secure is an optical-fibre network?

Analysis: How secure is an optical-fibre network?

What IT leaders should consider.
Dave Bailey Aug 7 2009 7:06AM Technology
How to succeed as an interim IT manager

How to succeed as an interim IT manager

Working on a short-term contract can be challenging.
Simon Berry Jun 19 2009 7:08AM Training & Development
Opinion: How SMEs can implement tailored IT systems

Opinion: How SMEs can implement tailored IT systems

Too often, small and medium-sized enterprises (SMEs) do not take responsibility for educating themselves sufficiently about technology, instead putting their trust in technology vendors or channel partners whose interests are not always aligned with the SME's.
Tim Harmon, Feb 4 2009 6:52AM Strategy
How to deploy secure unified communication

How to deploy secure unified communication

There is an uneasy tension between the concepts of unified communications (UC) and IT security.
Computing staff Jan 23 2009 6:26AM Software
How new access control technologies can address insider threats

How new access control technologies can address insider threats

Open networks and fast-moving data allow errors and malfeasance by network insiders to create significant financial, public-relations and regulatory risks, says Juniper's Rich Campagna.
Rich Campagna Jan 13 2009 5:09PM Security
No fear factor: How to make role management work for the enterprise

No fear factor: How to make role management work for the enterprise

There are three key objectives to keep in mind for determining the success of any roles-based access and identity management initiative, says Deepak Taneja.
Deepak Taneja Dec 3 2008 2:48PM Security
Case study: How Smartpath got into NEC SaaS ‘supermarket’

Case study: How Smartpath got into NEC SaaS ‘supermarket’

Local asset management ISV Smartpath is using NEC’s Applications Net to deliver its Loc8 software as a hosted offering to customers.
Ry Crozier Nov 18 2008 12:10AM Software
AMD vs Intel - How Shanghai shapes up

AMD vs Intel - How Shanghai shapes up

A couple of days ago we were alerted to what we were told was a Shanghai SAP score for an eight-socket machine, which looked to come in a full 30 per cent lower than the highest score, which incidentally seemed to be Intel’s Dunington.
Sylvie Barak Nov 17 2008 7:06AM Hardware
Just how harmless is Yahoo Fire Eagle?

Just how harmless is Yahoo Fire Eagle?

The launch of Fire Eagle may appear a harmless new addition to a growing group of interactive web applications but the consequence of a widespread take-up of the application may hold more sinister consequences, privacy experts have warned..
Rosalie Marshall Aug 18 2008 8:02AM Software
CIOs confused over how to calculate carbon footprint

CIOs confused over how to calculate carbon footprint

Fujitsu Services survey finds lack of advice on what CIOs should be included in carbon footprint.
Rosalie Marshall Aug 11 2008 4:02PM Strategy
Opinion: How to survive the Government ICT review

Opinion: How to survive the Government ICT review

The Whole of Government [WoG] ICT review to be conducted by Sir Peter Gershon has the potential to significantly cut costs and increase efficiency. But an Ovum analyst warns it could create both short and long-term disruption to Government agencies and suppliers.
Dylan Bushell-Embling Jul 10 2008 4:21PM Strategy
How exposed are you?

How exposed are you?

Social networking sites are a security minefield, so we have created some exercises to test for vulnerabilities.
Ken Munro May 22 2008 3:26PM Security
How IT security could go green?

How IT security could go green?

THE CHAIRMAN OF Wick Hill Group in the UK, which sells security infrastructure for ebusiness, has written a whitepaper outlining his views on how IT security could become more environmentally friendly.
Sylvie Barak May 16 2008 10:15AM Security
Hannaford tells regulators how breach happened

Hannaford tells regulators how breach happened

Hackers used sophisticated methods to evade detection and place malware on nearly 300 Hannaford Bros. store servers to intercept payment information during the credit card transaction process, the grocery chain told Massachusetts authorities.
Dan Kaplan Apr 2 2008 11:38AM Security

Log In

  |  Forgot your password?