user

CentricMinds passes 50,000 user milestone

CentricMinds passes 50,000 user milestone

Local enterprise software specialist CentricMinds has announced that its content management system now supports around 50,000 active users worldwide.
Staff Writers Jul 30 2007 1:24PM Software
IT user group to clarify green computing

IT user group to clarify green computing

Environmental IT Leadership Team to put carbon reduction policies into
practice.
Staff Writers Jul 23 2007 2:29PM Hardware
HP admits to fear of user reviews

HP admits to fear of user reviews

Email addresses checked to make sure competitors don't post.
Matt Chapman Jun 4 2007 2:31PM Hardware
Apple iTunes Plus 'recording user data'

Apple iTunes Plus 'recording user data'

Songs reported to store buyers' account info covertly.
Shaun Nichols Jun 1 2007 6:57AM Software
Google admits to user data disclosure

Google admits to user data disclosure

Anti-phishing list logged user names and passwords.
Shaun Nichols Jan 24 2007 8:17AM Security
Time lauds user generated content

Time lauds user generated content

You are the person of the year.
Tom Sanders Dec 19 2006 9:17AM Software
Browser history hack compromises user privacy

Browser history hack compromises user privacy

Proof-of-concept code demonstrates search history 'theft'.
Tom Sanders Oct 9 2006 10:03AM Security
Linspire drops Click 'N Run user fees

Linspire drops Click 'N Run user fees

Desktop Linux to open source software installation and update technology.
Tom Sanders Aug 31 2006 11:55AM Software
AOL user identified from search records

AOL user identified from search records

Data not as anonymous as company thought.
Will Head Aug 11 2006 1:47PM Telco/ISP
VoIP user claims Skype protocol hack

VoIP user claims Skype protocol hack

Chinese firm finds a way into the network.
Staff Writers Jul 17 2006 1:15PM Security
Microsoft switches ERP software to per user license

Microsoft switches ERP software to per user license

New licenses cuts back on costs and complexity, vendor promises.
Tom Sanders Jul 11 2006 2:10PM Software
It’s time to restrict user rights

It’s time to restrict user rights

Most of the best ideas in IT security – indeed, security in general – have been around for a long time. One that is all too often forgotten is the concept of “least privilege”, or using the bare minimum level of access to get the job done.

Nick Barron Jun 14 2006 5:22PM Security
User education key defense against spear phishing

User education key defense against spear phishing

Educating users about "spear phishing" by testing them via mock phishing drills can help protect organizations against the new trend in online crime, experts said Wednesday.
Marcia Savage Aug 17 2005 10:04PM Security
User downloads = spyware hell

User downloads = spyware hell

Spyware is costing companies $130,000 because they do not know what applications are being downloaded onto their networks, a survey has revealed.
David Quainton Aug 3 2005 4:59PM Security
The financial risks of uncontrolled user access

The financial risks of uncontrolled user access

Dangers are posed by ineffective provisioning of user access rights. A secure enterprise provisioning system can address specific risk areas highlighted by the FSA’s Financial Crime Sector Report.
Michael Burling Dec 8 2004 1:13PM Security
So are these first signs of an IT user fightback?

So are these first signs of an IT user fightback?

Jon Tullett Dec 7 2004 10:36AM Security
Boots boosts user authentication with biometrics

Boots boosts user authentication with biometrics

Boots Group PLC, one of the largest health and beauty companies in the United Kingdom, has deployed a biometric system designed to boost user authentication security.
Robert Jaques Nov 2 2004 11:05AM Security
IAmEmo set to reflect user mood

IAmEmo set to reflect user mood

In a push to popularise MMS services in Australia, a local company has released IAmEmo -- a cartoon lizard which helps display the sender's mood.
Ty Pendelbury Sep 17 2004 12:00AM Telco/ISP
Modular user management and provisioning

Modular user management and provisioning

Identity management solutions are comprised of several critical components: directory services, access management services, authentication services, and user management and provisioning services.
Jeff Schultz Aug 25 2004 10:28AM Security
26,000 user transport firm outsources patching

26,000 user transport firm outsources patching

A global transportation firm is using an all-in-one managed vulnerability service to protect its 26,000 users.
Dan Ilett May 26 2004 1:01AM Security

Log In

  |  Forgot your password?