protect

Google right to protect its trademark

Google right to protect its trademark

Objection to 'google' as a verb is justified, says lawyer.
Will Head Aug 18 2006 10:34AM Software
Opinion: Protect data from your staff

Opinion: Protect data from your staff

The rise in data security breaches and trade secret piracy over the past year is a wake-up call for executives. And the threat posed internally is just as great as that at the perimeter.
Jason Ashley, Aug 14 2006 2:44PM Security
Opinion: Protect data from your staff

Opinion: Protect data from your staff

The rise in data security breaches and trade secret piracy over the past year is a wake-up call for executives. And the threat posed internally is just as great as that at the perimeter.
Jason Ashley, Aug 14 2006 2:44PM Security
Patent changes considered to protect innovation

Patent changes considered to protect innovation

UK government office looks at role in encouraging invention.
Staff Writers Jul 21 2006 10:13AM Software
Duo to protect software rights

Duo to protect software rights

Black Duck Software and Atos Origin ink deal aimed at boosting asset
management.
Roge Howorth Jul 3 2006 9:20AM Software
Review: Shavlik Netchk Protect

Review: Shavlik Netchk Protect

Shavlik’s Netchk Protect has one of the nicest interfaces that we’ve seen. It is bright, simply laid out and makes obvious what function does what. This makes it one of the easiest products to use.
Christopher Moody Jan 1 2006 12:00AM Security
IT managers fail to protect mobile devices

IT managers fail to protect mobile devices

A third of IT professionals do not bother protecting their mobile devices with passwords, according to a new survey.
René Millman Nov 11 2005 4:48PM Security
Review: Disk Protect

Review: Disk Protect

Disk Protect from Becrypt is a competent hard disk encryption that looks very good on paper.
Peter Stephenson,CeRNS, Oct 3 2005 12:00AM Security
Federal data mining not doing enough to protect privacy

Federal data mining not doing enough to protect privacy

Data mining efforts at five federal agencies did not follow all rules for ensuring privacy of personal information, according to a recent report by the Government Accountability Office.
Marcia Savage Aug 30 2005 5:17PM Security
Review: Workshare Protect

Review: Workshare Protect

Distributing information in Microsoft Office documents can reveal more than was intended.

Eric Doyle Jul 27 2005 12:00AM Security
Failing to protect systems will turn you into roadkill

Failing to protect systems will turn you into roadkill

It must be conference season. I've never asked my colleagues on the speaking circuit if they've made this observation, but it seems I get a lot of questions that indicate that, although security folks protect their enterprises, they don't protect their security assets.
Peter Stephenson Mar 17 2005 2:04PM Security
Microsoft to share ways to protect customers

Microsoft to share ways to protect customers

Rich Kaplan, corporate vice president of Microsoft's Security Business & Technology Unit, will keynote the second night of the SC Forum.
From Staff Mar 16 2005 11:14AM Security
Bill proposes to protect Social Security details

Bill proposes to protect Social Security details

Staff Writers Jan 14 2005 5:02PM Security
Protect your Crown Jewels

Protect your Crown Jewels

Companies need to change their attitudes to outsourcing, says Neil Lloyd.
Neil Lloyd Jan 4 2005 2:36PM Security
To prevent and protect – new approaches against spyware

To prevent and protect – new approaches against spyware

Ninety two per cent of IT directors can’t be wrong. That’s the overwhelming majority of high-ranking IT professionals that see spyware as more than a nuisance to enterprises [Web@Work research, 2004]. Estimates even put the number of desktops affected by spyware as high as 90 per cent [US National Cyber Security Alliance].
Nigel Hawthorn Dec 8 2004 1:13PM Security
Govt looks to protect critical Aust IT systems

Govt looks to protect critical Aust IT systems

The federal government has set up a program aimed at identifying vulnerabilities in Australia's critical IT infrastructure.
Staff Writers Nov 29 2004 12:00AM Security
Beating the social engineering scams: what employees must do to protect company data

Beating the social engineering scams: what employees must do to protect company data

While technology can dramatically reduce the risk associated with threats and vulnerabilities in enterprise IT, the human factor is always critical in a comprehensive security strategy.
John Roese Oct 27 2004 3:27PM Security
Microsoft NT Workstation 4 customers must take 'immediate action' to protect themselves

Microsoft NT Workstation 4 customers must take 'immediate action' to protect themselves

Companies running Microsoft NT Workstation 4 (NT4) must take "immediate action to protect" themselves in the wake of Microsoft's announcement of 10 Windows security vulnerabilities on 12 October 2004, according to research firm Gartner.
Robert Jaques Oct 15 2004 2:07PM Security
Eaton Vance deploys Enterasys to protect financial data

Eaton Vance deploys Enterasys to protect financial data

Eaton Vance, a Boston-based financial-services firm, has deployed Enterasys' Secure Networks infrastructure to ensure data protection, network access control, and Sarbanes-Oxley compliance.
Marcia Savage Aug 18 2004 8:09PM Security
How to protect PCs against the Sasser worm

How to protect PCs against the Sasser worm

Staff Writers May 4 2004 12:00AM Security

Log In

  |  Forgot your password?