internal

Origin Energy completes troubled SAP transformation

Origin Energy completes troubled SAP transformation

Claims to have beaten deadline and saved $100 million.
Allie Coyne Sep 18 2014 6:31AM Software
TechOne to devolve internal IT, move to cloud

TechOne to devolve internal IT, move to cloud

IT Dept hands reins back to business units.
Ry Crozier Jan 11 2013 11:33AM Strategy
NZ Government awards IaaS work

NZ Government awards IaaS work

At least eight agencies to benefit initially from infrastructure on-demand.
Staff Writers Oct 25 2011 5:02PM Networking
Computer device theft hits Commonwealth agencies

Computer device theft hits Commonwealth agencies

IT system misuse remains key fraud vector.
Ry Crozier Apr 5 2011 1:34PM Hardware
NBN Co makes corporate data centre hire

NBN Co makes corporate data centre hire

Internal IT taking shape.
Ry Crozier Aug 23 2010 12:41PM Networking
US Congress to undergo cybersecurity overhaul

US Congress to undergo cybersecurity overhaul

Training and malware scans on the agenda.
Dan Kaplan Dec 17 2009 11:40AM Security
Lawyers concerned about finding internal data

Lawyers concerned about finding internal data

But rarely consulted about what tech might help.
Tom Young Nov 24 2009 6:30AM Storage
Symantec promotes internal staff to boost channel

Symantec promotes internal staff to boost channel

Symantec has promoted Jeff Arndt to the role of manager, National Partners, Symantec, Pacific region.
Jenny Eagle May 11 2009 10:09AM Security
Opinion: Slump exacerbates internal threats

Opinion: Slump exacerbates internal threats

Growing job insecurity is increasing the challenges faced by IT security chiefs, writes Forrester Research's Andrew Jasquith.
Andrew Jaquith Feb 9 2009 6:51AM Security
Facing the reality of internal risk: Thwarting insider threats

Facing the reality of internal risk: Thwarting insider threats

When we think about IT saboteurs, most of us picture a professional cyber-criminal or hacker bent on stealing confidential information or wreaking havoc. In both cases, the perpetrator is an outside party who breaches the data network of a company, institution, or government entity with malicious intent.
David Ting, CTO, Imprivata May 1 2008 7:30AM Security
DiData completes internal Vista SP1 deployment

DiData completes internal Vista SP1 deployment

Managed services provider Dimension Data has this week completed a full-scale internal deployment of Windows Vista Service Pack 1 (SP1) on the company's 300 Windows Vista computers.
Liz Tay Mar 13 2008 7:35AM Software
Consultant's view: Internal sender spoofing - Ban mail from

Consultant's view: Internal sender spoofing - Ban mail from

It's easy to make email appear to come from an internal user, warns Ken Munro. So be on the lookout.
Nov 27 2006 9:31AM Security
Social engineering and other threats to internal security

Social engineering and other threats to internal security

How difficult would it be for a good looking woman dressed in a provocative outfit to gain access to your internal network?
Ari Tammam Dec 16 2005 11:46AM Security
Worms, internal attacks plague enterprise networks

Worms, internal attacks plague enterprise networks

A large number of companies continue to suffer network attacks caused by internet worms and many experience compromises caused credentialed users, according to a survey released by Mazu Networks.
Marcia Savage Feb 10 2005 11:14PM Security
Companies slow to patch internal systems

Companies slow to patch internal systems

Companies take 62 days on average to patch their internal systems compared to 21 days for internet-facing systems, according to research by Gerhard Eschelbeck, CTO of vulnerability management firm Qualys.
Marcia Savage Jul 29 2004 12:04AM Security
Microsoft describes internal security efforts

Microsoft describes internal security efforts

Microsoft's newly appointed CIO Ron Markezich talked about the vendor's internal IT security in a presentation Thursday at Microsoft's campus in Mountain View, Calif.
Marcia Savage May 28 2004 1:15AM Security
Check Point offers dedicated internal protection

Check Point offers dedicated internal protection

To help companies tackle threats inside their networks, Check Point has introduced what it is calling an internal security gateway. InterSpect offers network zone segmentation, worm and pre-emptive attack protections, LAN protocol security and more.
Illena Armstrong Jan 20 2004 7:44PM Security
Do Firewalls and IDS Create a False Sense of Internal Security?

Do Firewalls and IDS Create a False Sense of Internal Security?

In an effort to boost sales and generate revenue, one U.S. multinational energy company recently embraced the Internet to bolster external communication and internal collaboration.
Abishek Chauhan Jan 14 2004 4:36PM Security
Cyberliability: Turning the Spotlight to Internal IT Security

Cyberliability: Turning the Spotlight to Internal IT Security

Is your company data an asset or a threat?
Staff Writers Jan 14 2004 4:05PM Security
Technology One completes internal restructure

Technology One completes internal restructure

Byron Connolly Jan 1 2000 12:00AM Software

Log In

  |  Forgot your password?