how

Going solo: How to be a security consultant

Going solo: How to be a security consultant

We all dream of being our own boss, but what does it take to set up a successful business in the real world? Mark Mayne has some advice.
Mark Mayne Mar 27 2008 12:04PM Security
How do you protect what you don't know exists?

How do you protect what you don't know exists?

Almost every day there is news of a company's security breach and, increasingly, many of these incidents are originating from an employee or other internal source.
Alex Gorelik Jan 29 2008 9:30AM Security
Guest column: How data integration can help make e-voting a reality

Guest column: How data integration can help make e-voting a reality

Electronic voting, or e-voting, has been growing in prominence in recent times and for good reason.
Laurie Newman Nov 21 2007 3:58PM Software
How big media's copyright campaigns threaten Internet free expression

How big media's copyright campaigns threaten Internet free expression

Big media companies' efforts to extend copyright are hurting creators' abilities to find audiences for their work, argues cyber-rights activist Cory Doctorow.
Cory Doctorow Nov 6 2007 7:14AM Telco/ISP
How to get more intelligent about smartphones

How to get more intelligent about smartphones

It was about four years ago when the IT department at Chris McClanahan's Fortune 500 financial services company began noticing a widespread influx of so-called smartphones seeking connection to the corporate network.
Dan Kaplan Oct 15 2007 12:02PM Security
When it comes to network security, there are no grey areas

When it comes to network security, there are no grey areas

Millions of applications are installed on company networks each day without the permission of the IT department. These pieces of software are known as ‘Greynets’. They are multiplying constantly and, with many remaining unknown to the IT team and others difficult to locate, are damaging network performance, distracting staff, and creating a hole in network defences.
Staff Writers Oct 8 2007 12:22PM Security
Panel discussion: How to manage enterprise risk?

Panel discussion: How to manage enterprise risk?

Does IT security risk management need actuarial analysts? Should the IT department define and control risk? Four of Australia’s leading IT security professionals sat down and discussed these burning issues.
Negar Salek Sep 26 2007 3:39PM Security
How the IT department can prep for the courtroom

How the IT department can prep for the courtroom

There has been a steady increase in corporate litigation over the past decade, and those legal proceedings are having an unforeseen impact on IT managers. This trend has been accelerated by the recent changes in the Federal Rules of Civil Procedure (FRCP).
Greg Lawn, Sep 12 2007 3:39PM Security
How many errors are OK?

How many errors are OK?

Intel's latest processor has triggered a debate about the reliability of hardware. Where do you stand?
Nick Barron, Sep 4 2007 1:07PM Security
How safe are your health records?

How safe are your health records?

One of the main reasons why people are resisting Internet banking is due to concerns around IT security.
Temp User Aug 10 2007 2:25PM Security
SC Infographic: How to be secure

SC Infographic: How to be secure

Protecting a modern business is not easy. Our guide shows that even the best technology and tactics have limitations.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Jul 31 2007 3:39PM Security
Security market growing how fast?

Security market growing how fast?

Just how rapidly the IT security market is expanding depends on who you ask. While one recent IT industry analyst report said it "has fast evolved into a high revenue-generating industry," another analyst questioned the report's findings.
Jim Carr Jul 20 2007 10:06AM Security
How SOX shaped technology

How SOX shaped technology

It all started with PCs in the workplace, then client-server architectures, then broad adoption of the internet with its openness and broad file-transfer capabilities and instant messaging and more.
Steve Elliott, May 29 2007 10:05AM Security
How the TJX breach may change security awareness

How the TJX breach may change security awareness

Despite the recent TJX security breach, it is natural to conclude that companies will continue to ignore the seething vulnerabilities that lead to massive thefts of sensitive information.
J. Patrick Apr 12 2007 4:41PM Security
How to protect against Wiki, MySpace and other Web 2.0 threats

How to protect against Wiki, MySpace and other Web 2.0 threats

Time Magazine recently bestowed its prestigious "Person of the Year" honour on "You," recognising the growing social importance of community and collaboration on the web.
Dan Nadir, Mar 28 2007 5:05PM Security
Mobile security: Tips and tricks to protect business from threats

Mobile security: Tips and tricks to protect business from threats

Anyone that’s ever had the less-than-pleasant experience of being cooped up in a cab with a taxi driver intent on educating you about the state of the world will surely tell you that when it comes to useful insights and analysis, cab drivers are not the best place to turn.
Simon Sharwood Mar 12 2007 11:41AM Security
10 ways to protect intellectual property

10 ways to protect intellectual property

Intellectual property (IP) assets are at the heart of businesses. Increasingly these assets are available in digital formats: Microsoft Word files, Excel spreadsheets etc, making them easy targets.
Ratinder Paul Feb 28 2007 3:21PM Security
How to protect your business from VoIP threats

How to protect your business from VoIP threats

As the epidemic of spam and malware continues to barrage email systems, one might think the industry would have learned to build strong security into new communications protocols. Unfortunately, in the case of VoIP - the most important new communications protocol since SMTP - this is not true. Historically, the development of VoIP infrastructure has prioritised quality and reliability over security, with few security measures being built in.
Neel Mehta, Feb 19 2007 9:57AM Security
Legal matters: How to make AUPs stick

Legal matters: How to make AUPs stick

Can organisations enforce Acceptable Use Policies? Tamzin Matthew investigates.
Jan 17 2007 12:15PM Security
From The Security Standard: How financial world will react to FFIEC deadline still uncertain

From The Security Standard: How financial world will react to FFIEC deadline still uncertain

As the Dec. 31 deadline creeps closer for financial organizations to comply with new federal guidelines mandating multi-factor authentication, the jury is still out on how financial institutions will react, said a panel of experts speaking Wednesday at The Security Standard conference in Boston.
Dan Kaplan Sep 7 2006 10:39PM Security

Log In

  |  Forgot your password?