key

Alcatel Lucent merger passes key hurdle

Alcatel Lucent merger passes key hurdle

Firms receive CFIUS approval to proceed.
Robert Jaques Nov 22 2006 10:48AM Networking
Criminals hold key to AV future

Criminals hold key to AV future

Criminals and software giant Microsoft hold the key to the future of the anti-virus industry, according to an anti-virus expert.
René Millman Jun 15 2006 4:49PM Security
ID is key in phishing battle

ID is key in phishing battle

Don’t lower your guard – criminals will always find new ways to perpetrate fraud
David Zumwalt Aug 26 2005 2:33PM Security
User education key defense against spear phishing

User education key defense against spear phishing

Educating users about "spear phishing" by testing them via mock phishing drills can help protect organizations against the new trend in online crime, experts said Wednesday.
Marcia Savage Aug 17 2005 10:04PM Security
Collaboration is key to infosecurity future says Symantec’s Thompson

Collaboration is key to infosecurity future says Symantec’s Thompson

Symantec CEO John Thompson used his keynote speech at the San Francisco RSA conference to demand radical reform in the security market, and dismissed Microsoft's efforts as insufficient.
Staff Writers Mar 17 2005 2:00PM Security
The Key to Compliance

The Key to Compliance

In the wake of the Enron and Worldcom accounting scandals, the regulations an enterprise implements to ensure its integrity are open to increasing scrutiny. This has given rise to a growing number of initiatives such as Basel II, the Sarbanes-Oxley Act and the new Companies Act, all designed to ensure that high-standards of corporate governance become part of day-to-day business culture.
Michael Burling Jan 26 2005 2:09PM Security
Storage is key to security

Storage is key to security

Ten things to know when selecting a storage security solution.
Steve Wllson Jan 11 2005 1:02PM Security
ID mapping: the compliance key

ID mapping: the compliance key

Brian Milas argues that identity mapping offers cost and security benefits, while meeting strict regulations
Brian Milas Oct 15 2004 4:59PM Security
The key to secure email

The key to secure email

James Angle explains the changes his hospital undertook in order to secure its confidential health data for HIPAA
Staff Writers Oct 15 2004 4:20PM Security
Identity Management: A Key Enabler of IT-Business Alignment

Identity Management: A Key Enabler of IT-Business Alignment

As technologies have improved and the value of the Internet to business has exploded because of technologies like Java and XML, the abilities of vendors to graphically and accurately represent the status of hardware, network and application components became much more robust.
Gary Holland Oct 6 2004 3:36PM Security
A USB key to a secure VPN

A USB key to a secure VPN

Marcia Savage reports on how a Washoe County administrator chose to provide secure remote access for staff.
Marcia Savage Jun 25 2004 11:57AM Security
CFO Survey: Security Key Concern

CFO Survey: Security Key Concern

Security surfaced as a major concern for senior financial officers, according to a survey conducated by Computer Sciences Corporation.
Marcia Savage Jan 28 2004 11:49PM Security
Security firms produce all-in-one access key

Security firms produce all-in-one access key

Two security companies have teamed up to produce an all-in-one electronic door key and computer logon token.
Dan Ilett Jan 21 2004 6:26PM Security
Simple, Efficient Security Products are the Key to Successful Policy Enforcement

Simple, Efficient Security Products are the Key to Successful Policy Enforcement

Whether the problems lie with the end-user or at the board-level, with reticence or apathy, policy enforcement is one of the greatest challenges in securing the corporate network.
Jon Callas Jan 12 2004 10:11AM Security
ROI key to IT acquisitions: analysts

ROI key to IT acquisitions: analysts

Vivienne Fisher Jan 1 2000 12:00AM Storage
Mobility key to growth

Mobility key to growth

Fleur Doidge Jan 1 2000 12:00AM Networking

Log In

  |  Forgot your password?