to

A safer way to stay in contact

A safer way to stay in contact

As workforces are becoming increasingly mobile, companies are searching for a variety of technologies to secure mobile users.
Marcia Savage Oct 15 2004 4:22PM Security
Biometrics: How to plan your very own project

Biometrics: How to plan your very own project

Good planning before you implement biometrics is key if you want to reap the benefits of this technology, Martin Jacobs explains why
Martin Jacobs Oct 15 2004 4:22PM Security
The key to secure email

The key to secure email

James Angle explains the changes his hospital undertook in order to secure its confidential health data for HIPAA
Staff Writers Oct 15 2004 4:20PM Security
Facing up to the spate of menacing attacks

Facing up to the spate of menacing attacks

Illena Armstrong Oct 15 2004 4:18PM Security
Microsoft NT Workstation 4 customers must take 'immediate action' to protect themselves

Microsoft NT Workstation 4 customers must take 'immediate action' to protect themselves

Companies running Microsoft NT Workstation 4 (NT4) must take "immediate action to protect" themselves in the wake of Microsoft's announcement of 10 Windows security vulnerabilities on 12 October 2004, according to research firm Gartner.
Robert Jaques Oct 15 2004 2:07PM Security
SANS calls to shame 'underperforming' computer science departments

SANS calls to shame 'underperforming' computer science departments

SANS research director Alan Paller has criticised educational institutions for a lack of focus on security issues. The comments come with the release of SANS top 20 list, which details the most common internet security vulnerabilities.
David Quainton Oct 14 2004 2:23PM Security
Be prepared to meet an iceberg

Be prepared to meet an iceberg

“When anyone asks me how I can best describe my experience in nearly forty years at sea, I merely say, uneventful. Of course there have been winter gales, and storms and fog and the like. But in all my experience, I have never been in any accident... or any sort worth speaking about. I have seen but one vessel in distress in all my years at sea. I never saw a wreck and never have been wrecked nor was I ever in any predicament that threatened to end in disaster of any sort.” E. J. Smith, 1907, Captain, RMS Titanic
Tom Keane Oct 13 2004 11:37AM Security
The need to define malware

The need to define malware

It is a problem of legend within the computing industry that, surprisingly, there is no universally accepted definition of the term 'computer virus'.
David Perry Oct 13 2004 11:27AM Security
ISPs told to clean up their networks

ISPs told to clean up their networks

A security expert called on ISPs to do more to stop attacks on their corporate customer's networks.
René Millman Oct 9 2004 11:09AM Security
Simply Wireless staff, creditors to go home empty-handed

Simply Wireless staff, creditors to go home empty-handed

Staff and unsecured creditors have been told they are unlikely to recoup any part of the $1.9 million still owing to them after insolvent wireless integrator Simply Wireless has been wound up.
Fleur Doidge Oct 8 2004 12:00AM Networking
Local call centre operations ready to spend

Local call centre operations ready to spend

An industry-sponsored study has claimed the Australian call centre market is set for expansion, with 62 percent of local call centres signalling plans to increase operations in the next 12 months.
Fleur Doidge Oct 8 2004 12:00AM Telco/ISP
Spammers exploit 'click here to remove' Trojan

Spammers exploit 'click here to remove' Trojan

Spammers are taking advantage of a newly discovered drag-and-drop JavaScript exploit that uses an Internet Explorer bug to download malicious .exe files when a mouse is scrolled across a specially coded domain page.
Robert Jaques Oct 7 2004 9:44AM Security
CA to acquire Netegrity

CA to acquire Netegrity

Looking to bolster its identity and access management portfolio, Computer Associates International will acquire security software maker Netegrity in a cash deal valued at approximately $430 million.
Marcia Savage Oct 6 2004 7:41PM Security
DOE infosec weaknesses led to 199 intrusions

DOE infosec weaknesses led to 199 intrusions

Problems with the Department of Energy's cybersecurity program led to 199 intrusions, affecting 3,531 systems across the agency in fiscal year 2004, according to the DOE's inspector general.
Marcia Savage Oct 5 2004 10:10PM Security
People Telecom adds Destra music to online services

People Telecom adds Destra music to online services

ISP People Telecom and hosting and media provider Destra have signed a commercial agreement to deliver music 24 hours a day to People Telecom customers.
Staff Writers Oct 1 2004 12:00AM Telco/ISP
Vendors struggle to cope with WLAN security threats

Vendors struggle to cope with WLAN security threats

The market for wireless local area network (WLAN) security technologies is growing "phenomenally", but vendors are struggling to keep up with the fast-moving nature of WLAN security threats, industry experts have warned.
Robert Jaques Sep 29 2004 11:28AM Security
Austrian bank boosts security to meet Basel II Accord

Austrian bank boosts security to meet Basel II Accord

BAWAG-PSK, the fourth-largest bank in Austria, has conducted a major network upgrade in a bid to boost IT security in the face of "unprecedented threats" and to meet the regulatory requirements of the forthcoming Basel II Accord.
Robert Jaques Sep 28 2004 9:28AM Security
Super distributor Ingram to own 35 percent [updated]

Super distributor Ingram to own 35 percent [updated]

Global distribution giant Ingram Micro Inc has acquired Tech Pacific in a $700 million cash deal that local Ingram boss Steve Rust said would give the combined entity up to 35 percent of the Australian distribution market.
Byron Connolly & Sarah Stokely Sep 28 2004 12:00AM Hardware
DCG becomes ispOne to focus on wholesale

DCG becomes ispOne to focus on wholesale

Melbourne ISP Data Consulting Group (DCG) has axed its retail operation Dinkum Internet and renamed itself ispOne to focus on its wholesale business.
Fleur Doidge Sep 27 2004 12:00AM Telco/ISP
Creating an ROI to justify information security budgets

Creating an ROI to justify information security budgets

The way to get the executive team to pay attention is to provide a quality ROI on any new initiative. If the boards of directors can’t understand the needs of various departments then the only way to their pocketbook is to present them with a bottom line return on their investment.
Ron Lepofsky Sep 22 2004 3:12PM Security

Log In

  |  Forgot your password?