securing

The evolution of a threat

The evolution of a threat

Exclusive extract from new book on securing web apps.
Dec 5 2011 1:45PM
Securing businesses is "extremely challenging", claim UK bosses

Securing businesses is "extremely challenging", claim UK bosses

British businesses are finding that protecting their organisations from hackers, social networking threats and browser vulnerabilities is an increasing struggle, according to research
Jun 11 2008 11:00AM
From Interop: Securing Wi-Fi must be priority

From Interop: Securing Wi-Fi must be priority

As the use of Wi-Fi by businesses becomes more pervasive, IT departments must rethink their wireless security strategy to combat threats, a panel said Tuesday at the Interop conference in Las Vegas.
May 1 2008 10:36AM
Securing Wi-Fi must be priority

Securing Wi-Fi must be priority

As the use of Wi-Fi by businesses becomes more pervasive, IT departments must rethink their wireless security strategy to combat threats, a panel said Tuesday at the Interop conference in Las Vegas.
Apr 30 2008 2:19PM
Event describes importance of securing Web 2.0

Event describes importance of securing Web 2.0

The Secure Enterprise 2.0 Forum, which looked at the advantages and security risks of Web 2.0 technology use in the enterprise, debuted today in New York.
Apr 30 2008 10:12AM
Blue Coat covers security for Gold Coast Council

Blue Coat covers security for Gold Coast Council

Gold Coast City Council has deployed Blue Coat Systems’ ProxySG and ProxyAV appliances to provide Web security, policy control, reduce bandwidth consumption, speed application performance and protect against malware.
Jan 21 2008 2:25PM
Weighing the options for securing back-up data

Weighing the options for securing back-up data

With the looming threats of publicly exposed personal data breaches, mishandled confidential partner information and lost intellectual property assets, an increasing number of enterprises are investigating options for securing data stored on both tape- and disk-based media.
Sep 10 2007 3:03PM
Securing data in motion vs. data at rest? It’s the wrong question!

Securing data in motion vs. data at rest? It’s the wrong question!

Securing vital and sensitive corporate data is an ongoing and forefront concern for any organisation. However, recently there have been numerous vendor announcements for new products claiming to solve data security problems and compliance challenges by either protecting “data in motion” or “data at rest.”
Jun 6 2007 10:40AM
Securing the future of information technology

Securing the future of information technology

Running parallel to the huge business benefits brought about by the ubiquitous and increasingly open-access use of computers are huge risks resulting from information security breaches.
Dec 15 2006 12:14PM
Debate: Client-side security is a much better way of securing infrastructure than securing the gateway

Debate: Client-side security is a much better way of securing infrastructure than securing the gateway

Mar 8 2006 5:15PM
Los Alamos securing communications

Los Alamos securing communications

A team of Los Alamos scientists, in collaboration with researchers from the National Institute of Standards and Technology in Boulder, Colo., and Albion College, in Albion, Mich., have achieved quantum key distribution (QKD) at telecommunications industry wavelengths in a 50-kilometer (31 mile) optical fiber.
Feb 21 2006 11:04AM
Securing IT is innovative thinking

Securing IT is innovative thinking

Nothing new is really going down in information security right now. At least that’s the take of some of SC’s Editorial Advisory Board members. There is no innovation, some say. The industry is stuck in a rut, say others. And it seems they’re not alone.
Jan 11 2006 8:50PM
Securing instant messaging

Securing instant messaging

It was only recently that IM was the preserve of teens and net-savvy companies. But like so many applications that start small, IM has made the leap from cool tool to useful business application. US analyst Gartner suggests that IM "will rival email in terms of both volume and ubiquity." In 2005 alone, it believes half of all companies will be using enterprise-level IM clients.
Jul 6 2005 10:38AM
The challenge of securing VoIP

The challenge of securing VoIP

Voice over IP (VoIP) is rapidly becoming a pervasive technology as businesses embrace cost savings on calls whilst enjoying advanced communications applications sitting within the network.
Dec 21 2004 12:01PM
Eight steps to securing administrative passwords

Eight steps to securing administrative passwords

When password management comes to mind, most IT managers think of their own personal passwords or those of end users, which are used to access the company's network, sales database or e-mail systems.
Dec 15 2004 12:27PM
Securing removable media

Securing removable media

Removable media devices are here to stay. Their ease of use and low cost have made them ubiquitous in the work environment – but at what price? In this article we look at the pro’s and con’s of removable media, and the steps IT managers can take to mitigate the security risks associated with them.
Nov 2 2004 4:25PM
Meeting the challenges of securing your business

Meeting the challenges of securing your business

Events in the news during the past few years have taught us all many lessons. However, the primary lesson that all businessmen should have learned, is the need to keep their businesses secure in an ever changing and increasingly malevolent world. From fears about Y2K to the tragic events of September 11, the need for heighten security is readily apparent. Heightened alert is a worldwide status.
Jun 15 2004 12:21PM
Securing the Network Edge

Securing the Network Edge

In the evolution of communications networks, the lines between computing and networking have become less than clear.
Jan 16 2004 9:49AM
Securing Enterprise Application Portals

Securing Enterprise Application Portals

A critical evaluation of success in today’s economy must be the ability to respond to an ever-increasing rate of change.
Jan 15 2004 12:09PM
Securing and Managing Electronic Messaging in the Enterprise

Securing and Managing Electronic Messaging in the Enterprise

The threats and problems posed by email in large and complex organizations are of a different type and scale of magnitude from the email problems that such organizations first solved with an email ‘point product’ some years previously.
Jan 15 2004 10:53AM

Log In

Username / Email:
Password:
  |  Forgot your password?