information

Newspapers lose readers' information

Newspapers lose readers' information

As many as 240,000 subscribers to The Boston Globe and Worcester (Mass.) Telegram & Gazette could be at risk for identity theft after their credit card numbers mistakenly were printed on the back of routing slips attached to newspaper bundles, the papers reported this week.
Dan Kaplan Feb 2 2006 10:14PM Security
New benchmark for data management

New benchmark for data management

Former Info-Sys Australia founder and executive director, Ananda Rao, has re-emerged with a new start-up, Benchmark Holdings.
Tim Lohman Dec 13 2005 12:30PM Software
Few trust websites with personal information, report finds

Few trust websites with personal information, report finds

Less than one in five people are confident that websites will treat personal information properly, according to a new survey by the UK information commissioner.
René Millman Nov 21 2005 4:19PM Security
Debate: Should information security firms appoint former hackers to development roles?

Debate: Should information security firms appoint former hackers to development roles?

Simon Khalaf Nov 11 2005 3:46PM Security
Review: TriGeo Security Information Manager

Review: TriGeo Security Information Manager

This product is based upon a substantial rack-mount hardware appliance running Linux, and a Windows-based console and reporting capability with which to administer the system. Agents are then placed on target machines across the network and acknowledged at the console.
Julian Ashbourn Nov 1 2005 12:00AM Security
Infosys exec starts Vic information manager

Infosys exec starts Vic information manager

Infosys Australia founder and second-in-charge Ananda Rao has started a Melbourne company targeting global opportunities for information management and solutions.
Fleur Doidge Oct 24 2005 5:21PM Networking
Debate» Ethical hacking courses fail to provide practical information to security professionals

Debate» Ethical hacking courses fail to provide practical information to security professionals

Prof. Ken Jul 1 2005 4:20PM Security
Computers containing patient information stolen

Computers containing patient information stolen

A California medical group is notifying patients that they may be at risk of identity theft after burglars stole two computers containing their personal information.
Marcia Savage Apr 8 2005 11:50PM Security
Too much information?

Too much information?

Corporations are now facing a deluge of data gathered from the electronic trails left by their customers, according to Gartner analyst Bob Hayward.
Damien Virulhapen Feb 28 2005 11:03AM Storage
Information Act requests soar

Information Act requests soar

4,000 requests have been made in less than one month under the Freedom of Information Act (FoIA). The act, designed to promote more openness amongst public sector bodies, requires release of information within 20 days if requested.
David Quainton Feb 2 2005 3:37PM Security
Creating an ROI to justify information security budgets

Creating an ROI to justify information security budgets

The way to get the executive team to pay attention is to provide a quality ROI on any new initiative. If the boards of directors can’t understand the needs of various departments then the only way to their pocketbook is to present them with a bottom line return on their investment.
Ron Lepofsky Sep 22 2004 3:12PM Security
Australasian information brokers widen data net

Australasian information brokers widen data net

Information broker Citec Confirm, a division of Queensland IT outsourcer Citec, has struck a three-year services deal with New Zealand-based credit check agency Baycorp Advantage.
Fleur Doidge Sep 22 2004 12:00AM Networking
Managing information security in modern commercial environments

Managing information security in modern commercial environments

We began this series of articles with the observation that recent advances in the area of network technology and the success of the Internet have resulted in a new business model. This new model has resulted in a number of new challenges in the area of information security which, although largely understood, are only partially resolved. As a result, information security-related risk has been growing rapidly in the last few years and companies will need to take a more proactive stance to managing this risk in order to continue to enjoy the benefits that technological advances have made possible.
Steve Purser Jun 15 2004 12:09PM Security
Managing information security in modern commercial environments

Managing information security in modern commercial environments

Previous articles in this series have outlined the challenges facing the present-day information security manager, presented an approach to meeting these challenges and analysed the purpose of the consolidation phase in some detail. We now turn our eyes to the second phase of the approach – the strategic planning cycle.
Steve Purser Jun 8 2004 11:37AM Security
Managing information security in modern commercial environments

Managing information security in modern commercial environments

The previous article in this series described an overall approach to securing information and provided a high-level description of the consolidation period and the strategic planning cycle. We continue this development by taking a more detailed look at the consolidation period.
Steve Purser Jun 1 2004 12:01PM Security
Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

In the first article of this series, we identified and provided examples of the types of issues that need to be resolved if organisations are to correctly manage risk in the area of information security. If we combine the impact of these trends and issues with the fact that most enterprises are being forced to cut costs in order to remain competitive the true magnitude of the problem becomes apparent. Simply put, information security managers have to secure more complex environments, faster and using less resources.
Steve Purser May 24 2004 5:37PM Security
Monitoring your information zoo

Monitoring your information zoo

Employees use email and the internet to do their work every day. So do cybercriminals. Illena Armstrong explores how to manage a company’s indispensable pet, information
Illena Armstrong Mar 12 2004 5:19PM Security
Information Assurance and Corporate Governance: Engaging Senior Management

Information Assurance and Corporate Governance: Engaging Senior Management

Information assurance (IA) is key to the effective management of any organization in today's economy.
Aarti Anhal Jan 19 2004 11:08AM Security
Sharing Infosec Information

Sharing Infosec Information

Infosecurity is hitting the mainstream.
Illena Armstrong Jan 19 2004 10:52AM Security
Information Security Outlook for Asia Pacific

Information Security Outlook for Asia Pacific

Just five years ago, information security in the Asia Pacific region was simply another job function to most IT people.
Chester Soong Jan 19 2004 10:50AM Security

Log In

  |  Forgot your password?