policies

AWS to proactively remove more content that violates rules from cloud service

AWS to proactively remove more content that violates rules from cloud service

Renews debate over power of tech companies to restrict free speech.
Sheila Dang Sep 6 2021 6:59AM Cloud
SSH inventor proposes best practice guidance

SSH inventor proposes best practice guidance

Some businesses spend 10 percent of working time on fixing SSH keys.
Dan Raywood Apr 18 2013 3:49PM Security
VCE alliance tips to stay ahead of the bad guys

VCE alliance tips to stay ahead of the bad guys

Update what you know for the cloud.
SC Australia Staff Feb 21 2011 10:37AM Security
Most organisations falling short on cloud security policies

Most organisations falling short on cloud security policies

Survey finds security oversight with cloud computing.
Angela Moscaritolo Apr 6 2010 12:20PM Security
New study highlights weak password policies

New study highlights weak password policies

Users still selecting easily-compromised passwords.
Shaun Nichols Jan 22 2010 11:13AM Security
We don't need no education?

We don't need no education?

Advances in information technology have not been matched by advances in user education, as Lisa Myers explains.
Lisa Myers Aug 27 2009 4:24PM Security
Banks urged to change security policies

Banks urged to change security policies

Basic security questions, such as asking for a user's mother's maiden name or post code, can be circumvented far too easily and should not be used, according to Symantec.
Ian Williams Jan 23 2009 2:32PM Security
Malware and compliance issues swamp firms

Malware and compliance issues swamp firms

Internet attacks, data leaks and compliance breaches are still creating major headaches for IT departments, according to a recent report.
Shaun Nichols Oct 28 2008 6:37AM Security
Google updates data privacy policies

Google updates data privacy policies

Google has announced new measures designed to protect its users' privacy.
Rosalie Marshall Sep 10 2008 8:15AM Security
Police accused of 'excessive' data policies

Police accused of 'excessive' data policies

The UK's Information Commissioner's Office (ICO) has ordered four police forces to delete old criminal convictions from the Police National Computer.
Robert Jaques Nov 2 2007 3:06PM Security
Topfield supports ACCC call to revise consumer policies

Topfield supports ACCC call to revise consumer policies

Consumer electronics set-top box manufacturer, Topfield Australia, has supported the Australian Competition and Consumer Commission’s (ACCC) decision to revise its consumer policy framework.
Sarah Falson May 29 2007 3:26PM Hardware
Match your company policies with your solutions

Match your company policies with your solutions

The headlines are scary for both CIOs and the companies they work for. "Stolen Computer Holds Information of 16,000 Driver's License Holders," "Vulnerability Auctions Killing Responsible Disclosure," "Hacking for Dollars: Is The Botnet Battle Already Lost?" "Online Brokerage Account 'Incursions' Worry SEC."
Dan Farmer, Jan 2 2007 9:30PM Security
Enterprises forced to revamp security policies

Enterprises forced to revamp security policies

Combination of hackers and regulations prompt major rethink.
Robert Jaques Oct 19 2006 10:27AM Security
Enterprises forced to revamp security policies

Enterprises forced to revamp security policies

Combination of hackers and regulations prompt major rethink.
Robert Jaques Oct 19 2006 10:01AM Security
Policies and ethical standards

Policies and ethical standards

As the workplace environment continues to become more complex, there is an increased potential for unethical and inappropriate behavior by employees at all levels of the organization.
Joe Malec Mar 6 2006 10:17PM Security
Most IT acceptable use policies contain 'gaping security holes'

Most IT acceptable use policies contain 'gaping security holes'

Small- and medium-sized enterprises (SMEs) are leaving themselves vulnerable to security and compliance risks by not having internet acceptable use policies (AUPs) that address the latest and most dangerous internet-based threats, a new study has warned.
William Eazel Nov 14 2005 10:55AM Security
Firms urged to revamp outdated identity management policies

Firms urged to revamp outdated identity management policies

Researchers warned today that there is a pressing need for companies to scrutinize existing identity management policies to keep pace with rapid developments in access technology and mobile devices.
William Eazel Oct 11 2005 1:06PM Security
Wireless policies lag laptop usage

Wireless policies lag laptop usage

A survey of US companies shows that wireless networks have created new holes in security policies.
Ron Condon Oct 6 2005 11:51AM Security
Patching policies must be part of everyday practice

Patching policies must be part of everyday practice

Sarah Merrion finds that patch management requires a global, organized effort that is hardly child’s play
Sarah Merrion Apr 15 2004 10:12AM Security
Accelerating Security Policies thru Middleware

Accelerating Security Policies thru Middleware

As the lines dividing intranets and extranets continue to blur, companies like yours are rushing to expose private network applications and information assets to customers, business partners and employees.
Robert Lendvai Jan 19 2004 10:01AM Security

Log In

  |  Forgot your password?