securing

Securing Online Payments

Securing Online Payments

From the early days of the Internet, credit and charge card companies recognized the enormous opportunities presented to them - but they also saw challenges ahead.
Richard Moulds Jan 15 2004 10:11AM Security
Costs Versus Benefits in Securing Your Applications

Costs Versus Benefits in Securing Your Applications

The current state of application security practice is grim.
Bob Ayers Jan 15 2004 10:04AM Security
Securing the Last Unprotected Area of the Network

Securing the Last Unprotected Area of the Network

Just how secure is your network?
James Teel Jan 15 2004 9:57AM Security
Securing Image Content in Email

Securing Image Content in Email

What arrives in our in-boxes these days is becoming progressively richer and fatter. The content includes HTML formatted rich text, hyperlinks and attachments of various types, including Office documents, databases, images, videos, etc. It is now estimated that more than 5 per cent of emails contain images.
Staff Writers Jan 14 2004 5:00PM Security
Securing Online Payments

Securing Online Payments

From the early days of the internet, credit and charge card companies recognized the enormous opportunities presented to them - but they also saw challenges ahead.
Richard Moulds Jan 12 2004 2:38PM Security
Securing a Complex Communications Environment: Ten Top Tips

Securing a Complex Communications Environment: Ten Top Tips

The growth of e-security products and services is creating an administrative headache for enterprises.
Staff Writers Jan 12 2004 2:00PM Security
Hints and Tips on Securing your Mobile Workforce

Hints and Tips on Securing your Mobile Workforce

So you have a mobile workforce, you have invested in laptops, PDAs, mobiles and smartphones and your staff are out there chasing and winning business.
Kurt Lennartsson Jan 12 2004 1:30PM Security
Protecting Your Business in the Right Places - Securing Applications

Protecting Your Business in the Right Places - Securing Applications

Many companies are spending on corporate security in a fragmented and often directionless way, partly because of the bewildering complexity of security solutions.
Mike Lee Jan 12 2004 11:41AM Security
For Your Eyes Only: Securing Sensitive Data from Rogue Staff

For Your Eyes Only: Securing Sensitive Data from Rogue Staff

Defining what constitutes intellectual property can lead to differences of opinion.
Vanessa Chandrasekaran Jan 12 2004 10:21AM Security
Securing your business - a never ending story

Securing your business - a never ending story

Despite remaining a core issue for IT managers, a recent study by the United Kingdom’s Department of Trade and Industry indicates that as many as 78 percent of the U.K. companies surveyed have experienced at least one malicious security incident, with 44 percent experiencing them within the last year (2002/2001).
Matt Newman Jan 9 2004 3:32PM Security
Main Line choose RSA for securing patient records

Main Line choose RSA for securing patient records

One of the largest healthcare providers in South-eastern Pennsylvania has rolled out new measures to increase the security of patient records.
Rene Millman Jan 6 2004 1:22PM Security

Log In

  |  Forgot your password?