management

Information Assurance and Corporate Governance: Engaging Senior Management

Information Assurance and Corporate Governance: Engaging Senior Management

Information assurance (IA) is key to the effective management of any organization in today's economy.
Aarti Anhal Jan 19 2004 11:08AM Security
Identity Management - Delivering Security and Value

Identity Management - Delivering Security and Value

Ensuring information security has never been more important.
Peter Shillito Jan 16 2004 1:00PM Security
Business Continuity Management is Not a Luxury

Business Continuity Management is Not a Luxury

The Internet has been the catalyst for incredible change in our economy.
Steven J. Jan 16 2004 10:30AM Security
Novell updates identity management software

Novell updates identity management software

Novell released the latest version of its identity management product, Nsure Identity Manager 2 heralding tighter integration between its web services and identity management software.
Rene Millman Jan 14 2004 5:09PM Security
Danger money: The challenge of risk management

Danger money: The challenge of risk management

There is always a trade-off between security needs and economics. Richard Starnes asks how businesses can strike the right balance.
Richard Starnes Jan 13 2004 12:46PM Security
Change Management: What If it All Goes Wrong?

Change Management: What If it All Goes Wrong?

The U.K.’s Swanwick Air Traffic Control center is an unfortunate example of the problems that can occur with the continuity of a business while undergoing a period of change.
Staff Writers Jan 12 2004 1:54PM Security
The Five Critical Stages of Policy Management

The Five Critical Stages of Policy Management

A series of recent bloody court battles, well-documented in the press, have highlighted the importance of clear policies governing the use of an organization’s information systems.
Nathan Millard Jan 12 2004 1:43PM Security
Patch Management - The Foundation of IT Security

Patch Management - The Foundation of IT Security

The widespread impact of the SQL Slammer worm in January 2003 highlighted an issue that most security professionals see as a basic fact - IT system security is not based on a single installation, but on an ongoing management of risks and vulnerabilities.
Paul Collins Jan 12 2004 12:48PM Security
Security Policy Management: Email Risk Controls

Security Policy Management: Email Risk Controls

E-policy is a corporate statement and set of rules to protect the organization from casual or intentional abuse that could result in the release of sensitive information, IT system failures or litigation against the organization by employees or other parties.
Ann James Jan 12 2004 12:32PM Security
Meeting the Challenge of Identity Management: The Role of VPNs and Biometric Authentication

Meeting the Challenge of Identity Management: The Role of VPNs and Biometric Authentication

Organizations are increasingly being asked to provide staff with remote access to corporate systems.
Ken Douglas Jan 12 2004 12:25PM Security
Identity Management Case Example

Identity Management Case Example

A large food and general merchandise wholesaler in the United States had a strategic vision based on strengthening its relationships with the market’s largest retailers, and increasing its vertical penetration through the acquisition of niche channel wholesalers.
Jim Burns Jan 12 2004 11:10AM Security
Time to Own Up to Email Management

Time to Own Up to Email Management

Here’s a question: how many non-work related emails do you send and receive every day from your office email address?
Staff Writers Jan 12 2004 10:41AM Security
Business Continuity and Risk Management: Distant Cousins or Partners in Crime?

Business Continuity and Risk Management: Distant Cousins or Partners in Crime?

In a post 9/11 environment, the terms business continuity and risk management are becoming common parlance within a wide range organizations.
Dave Birch Jan 12 2004 10:13AM Security
Out-of-Band Management for Windows Server 2003

Out-of-Band Management for Windows Server 2003

Many networked devices, such as UNIX servers, routers and switches, are accessible through local serial console ports, for initial configuration and emergency management.
Burk Murray Jan 9 2004 4:40PM Security
Is Patch Management a Failing Strategy?

Is Patch Management a Failing Strategy?

If recent headlines about the Blaster worm sounded familiar, it was with good reason. Earlier this year, another worm was wreaking havoc on the internet, targeting a well-known Microsoft vulnerability.
Phil Hollows Jan 9 2004 3:46PM Security
The challenge of making enterprise management secure

The challenge of making enterprise management secure

There is a computer security mantra which says that the basic issues to manage are “ports, passwords and patches”.
John Alcock Jan 9 2004 2:00PM Security
The Need for Secure Project Management

The Need for Secure Project Management

Secure project management is a concept that blends the needs of project management and security.
Dan Emory Jan 9 2004 1:52PM Security
PeopleSoft sharpens management team

PeopleSoft sharpens management team

Under the shadow of Oracle’s hostile bid, PeopleSoft has outlined its local integration strategy after its merger with JD Edwards, including a new management team, cuts to back-office staff and a product roadmap.
Siobhan Chapman Nov 4 2003 12:00AM Software
StorageTek talks up information lifecycle management

StorageTek talks up information lifecycle management

Vivienne Fisher Sep 30 2003 12:00AM Storage
Review: Altiris Asset Management Suite

Review: Altiris Asset Management Suite

This solution offers a suite of products under an asset management banner, comprising inventory, app- lication metering, asset control, contract management and TCO management. Support for Mac OS has recently been added.

René Millman Aug 1 2003 12:00AM Security

Log In

  |  Forgot your password?