not

IT&T not accounting for business

IT&T not accounting for business

IT&T providers make up more than half the names on the Australian Securities and Investments Commission’s (ASIC’s) latest list of companies claimed to have slipshod accounting practices.
Fleur Doidge Apr 14 2004 12:00AM Strategy
Lexmark not opposed to cartridge refills

Lexmark not opposed to cartridge refills

Byron Connolly , Michael Gros Apr 9 2004 3:19PM Software
Malware not a factor in Aug. 14 blackout

Malware not a factor in Aug. 14 blackout

A report by a U.S.-Canadian task force concluded that malware did not cause or contribute to the Aug. 14 blackout last year.
Marcia Savage Apr 6 2004 6:57PM Security
Dynamic grey-marketing not fair: rival

Dynamic grey-marketing not fair: rival

A rival printer consumables distributor has hit out at Dynamic Supplies' pro-grey-marketing stance, alleging that its cheap parallel imports have spoiled the market for smaller companies.
Fleur Doidge Apr 2 2004 12:00AM Strategy
Cybersecurity panel: Government regulation not viable solution

Cybersecurity panel: Government regulation not viable solution

The message was loud and clear during a panel dicussion on cyberthreats held Thursday in Palo Alto, Calif.: The government should steer clear of regulating cybersecurity.
Marcia Savage Mar 26 2004 12:06AM Security
IBM not blue on new partner program

IBM not blue on new partner program

Fleur Doidge Mar 16 2004 12:00AM Software
Thou shalt not...

Thou shalt not...

Do this, don’t do that – you know the rules. But policy management is changing, and Barbara Gengler discovers that the future involves new technology and fresh ideas
Barbara Gengler Mar 12 2004 4:58PM Security
Bagle-B not rampant in Australia

Bagle-B not rampant in Australia

Internet security organisations Trend Micro and MessageLabs have discovered a variant of the Bagle email virus, called Bagle-B.
Nirmal Chandrasena Feb 18 2004 12:00AM Security
The big decision: To outsource or not?

The big decision: To outsource or not?

Market analysts predict that more of us will be outsourcing the IT security function over the next few years. In our latest Roundtable discussion, Julie Jervis hears the views and advice of four infosec professionals
Julie Jervis Jan 22 2004 11:40AM Security
IDS: Alarms, Not Walls

IDS: Alarms, Not Walls

Acronyms and coined phrases bedevil us, but during 2002, we probably aren't getting rid of them.
Barton Taylor Jan 19 2004 11:14AM Security
Linux not ready to kill Unix -- yet

Linux not ready to kill Unix -- yet

Despite the relentless march of Linux, major vendors believe commercial Unix releases aren't ready for the scrapheap yet.
Angus Kidman Jan 19 2004 12:00AM Software
To Hide or Not to Hide?

To Hide or Not to Hide?

Security through obscurity is always the subject of heated debate, although the relevant parties often wish it wasn’t, since no one likes their dirty laundry being aired in public.
Jon Tullett Jan 16 2004 10:55AM Security
Business Continuity Management is Not a Luxury

Business Continuity Management is Not a Luxury

The Internet has been the catalyst for incredible change in our economy.
Steven J. Jan 16 2004 10:30AM Security
Not Every Card Offers Well Wishes

Not Every Card Offers Well Wishes

Internet marketing and viruses have much in common: they are annoying, unwanted, and usually arrive by email.
Jon Tullett Jan 15 2004 12:17PM Security
Businesses Should Not Fear Teleworking Security Issues

Businesses Should Not Fear Teleworking Security Issues

In November 2002 SonicWALL published the results of an independent survey into the attitudes of British businesses towards teleworking and the steps most commonly taken to ensure home workers connect to the office securely.
Harry Gostling Jan 15 2004 10:42AM Security
Not Everything You Always Wanted to Know About Web Services Security

Not Everything You Always Wanted to Know About Web Services Security

Woody Allen, that famous web services guru and comedian on the side, once described James Joyce as “the most incomprehensible and hence the finest poet of his time.”
Throop Wilder Jan 15 2004 10:13AM Security
Technology is Not the Only Solution to Wireless Security?

Technology is Not the Only Solution to Wireless Security?

Despite the uncertainty regarding the best security practices for wireless networking, many organizations are interested in or are already deploying wireless LAN technology.
Dennis Seymour Jan 12 2004 11:39AM Security
Trusted Digital Identities - Not Just For People Anymore

Trusted Digital Identities - Not Just For People Anymore

Authentication using digital identities has been a hot topic recently, and its importance does not appear to be waning.
David Hicks Jan 12 2004 11:24AM Security
The Myth of ROI: Not every expense is an investment

The Myth of ROI: Not every expense is an investment

Information security teams are under increasing pressure to demonstrate financial return on investment (ROI) for security projects.
Tom Scholtz Jan 9 2004 3:30PM Security
The Myth of Information Security ROI: Not Every Expense Is an "Investment"

The Myth of Information Security ROI: Not Every Expense Is an "Investment"

Information security teams are under increasing pressure to demonstrate financial return on investment (ROI) for security projects.
Tom Scholtz Jan 9 2004 2:46PM Security

Log In

  |  Forgot your password?