section

Victoria enlists Section for whole-of-gov website delivery

Victoria enlists Section for whole-of-gov website delivery

Looks to embrace edge-enabled solutions.
Jan 19 2022 12:48PM
Flaw detected on Yahoo! website

Flaw detected on Yahoo! website

Imperva points to jobs section.
Nov 17 2009 10:46AM
New Zealand creative freedom website encourages blackout against Section 92A law

New Zealand creative freedom website encourages blackout against Section 92A law

Thousands of bloggers and users of social networking sites have 'blacked out' their profiles in support of a New Zealand protest group.
Feb 17 2009 10:32AM
SEC relaxes portions of SOX Section 404

SEC relaxes portions of SOX Section 404

The US Securities and Exchange Commission (SEC) has passed new interpretive guidelines that relax portions of Section 404 of The Sarbanes-Oxley Act of 2002.
May 31 2007 12:43PM
Product section: SC Lab takes a look at email content filtering, policy management products

Product section: SC Lab takes a look at email content filtering, policy management products

The theme in the labs this month was policy, policy and more policy. Lab manager Mike Stephenson looked at email content filtering, which depends on policies for its success, while reviewer Justin Peltier evaluated policy management products. In these two areas, policy determines success, but the two views are quite different.
Mar 14 2007 7:17PM
Passwords management for UNIX and Linux systems

Passwords management for UNIX and Linux systems

An unhappy systems administrator who may want to teach a seemingly unappreciative company a lesson. An employee who is passed over for a promotion or a raise. An IT manager who is disappointed by a bonus. A technically savvy database administrator willing to change information in the Oracle Financial Suite for a CEO whose future is riding on the next stock analyst's recommendation.
Feb 26 2007 7:12AM
Product Section: Two staples of information protection

Product Section: Two staples of information protection

This month, we have juxtaposed two of the foundations of information security: data protection and vulnerability assessment. On the protection side, we look at some of the key products in the area of whole disk encryption.
Jan 8 2007 10:02PM

Log In

Email:
Password:
  |  Forgot your password?