of

The Different Faces of Policy Enforcement

The Different Faces of Policy Enforcement

The traditional “triple A’s” of access security, Authentication, Authorization, and Accounting, have been joined by a newcomer - Auditing. Like its predecessors, auditing is most effective when enforced, rather than being voluntary.
Stacey Lum Jan 9 2004 1:46PM Security
Applying The Art of Forensics to Network Security

Applying The Art of Forensics to Network Security

Knowing when to call in a professional can be the most important decision an organization can make when it comes to security breaches – you can’t take chances if there’s a known breach or overwhelming evidence that one has occurred.
A. Bryan Jan 9 2004 1:33PM Security
Making protection pay - The business benefits of IT security

Making protection pay - The business benefits of IT security

Traditionally many organisations were of the opinion that security breaches were something that only affected ‘other’ companies and would never happen to them.
Jackie Groves Jan 9 2004 1:09PM Security
Phishers target Bank of England

Phishers target Bank of England

The Bank of England has been targeted by scammers seeking to con users into executing Trojan software.
Jon Tullett Jan 9 2004 12:40PM Security
The rise of the malicious spammer

The rise of the malicious spammer

One of the most noteworthy IT security developments of 2003 is the convergence between spamming and viral techniques, leading to a much more dangerous threat for email users.
Mark Sunner Jan 9 2004 12:35PM Security
Microsoft CRM welcomed...sort of

Microsoft CRM welcomed...sort of

Fleur Doidge Dec 11 2003 12:00AM Software
Integrators in end of year acquisitions

Integrators in end of year acquisitions

Storage integrator SecureData (SDG) has acquired Victorian IT infrastructure company Fulcrum just a few weeks after its purchase of database management provider SQL Services.
Byron Connolly Dec 9 2003 12:00AM Networking
NAB finds gold at end of CRM rainbow

NAB finds gold at end of CRM rainbow

Staff Writers Dec 9 2003 12:00AM Storage
Half of tech suppliers will die

Half of tech suppliers will die

Up to 50 percent of technology suppliers will be eliminated from the competitive landscape by the end of 2005, as job losses and vendor consolidation continues, according to research conducted by Gartner.
Byron Connolly Dec 4 2003 12:00AM Strategy
Telstra AGM: more of the same

Telstra AGM: more of the same

Siobhan Chapman Nov 17 2003 12:00AM Telco/ISP
Review: A collection of open source software

Review: A collection of open source software

As an alternative to costly proprietary tools, we sourced a variety of open source software, with the goal of emulating as much of the feature-sets offered by closed source products, such as EnCase and ProDiscover.

Jon Tullett Oct 1 2003 12:00AM Security
Microsoft prepares iWave of upgrades

Microsoft prepares iWave of upgrades

Paul Thurrott Feb 7 2003 12:00AM Software
Microsoft accused of mob-like tactics in European case

Microsoft accused of mob-like tactics in European case

Paul Thurrott Dec 3 2002 12:00AM Software
WorldCom turns a deeper shade of red

WorldCom turns a deeper shade of red

Staff Writers Nov 12 2002 10:51AM Telco/ISP
Workstations show signs of life

Workstations show signs of life

Staff Writers Nov 12 2002 10:48AM Hardware
Tablet let out of bottle

Tablet let out of bottle

James Riley Nov 7 2002 4:59PM Hardware
Corel slashes 22 percent of workforce

Corel slashes 22 percent of workforce

Staff Writers Nov 7 2002 9:07AM Software
Symantec seeks security at big end of town

Symantec seeks security at big end of town

Ian Yates Nov 7 2002 12:00AM Security
Sun wants appeal of Microsoft ruling

Sun wants appeal of Microsoft ruling

Staff Writers Nov 4 2002 8:32AM Software
Cyber war a mere act of vandalism

Cyber war a mere act of vandalism

Siobhan Chapman Jan 1 2000 12:00AM Security

Log In

  |  Forgot your password?