what

Branch office security: What are the real problems?

Branch office security: What are the real problems?

Organisations need not overlook security at their satellite office locations.
Gert Hansen, vice president of product management, Ast Jun 15 2010 10:36AM Security
Q&A: What happens when your cloud bursts?

Q&A: What happens when your cloud bursts?

No supplier is too big to fail, says Gartner's Steve Prentice.
Martin Courtney Mar 29 2010 6:59AM Strategy
Citigroup wonders what to do with redundant gear

Citigroup wonders what to do with redundant gear

When Citigroup announced that it was handing redundancies to more than 52,000 workers, few wondered what was going to happen to all those people's kit.
Nick Farrell Nov 21 2008 6:39AM Hardware
What you need to know to keep Mac OS X secure

What you need to know to keep Mac OS X secure

Just a few years ago, Apple commanded only a small fraction of the computer market.
Amol Sarwate, Sep 22 2008 4:12PM Security
Myspace suicide woman 'did what loads of people do online'

Myspace suicide woman 'did what loads of people do online'

Missouri mother Lori Drew’s lawyer is now arguing that if she is guilty, then so are millions of other internet users every day.
Emma Hughes Jul 25 2008 9:32AM Software
What you must know about network security before going global

What you must know about network security before going global

Globalisation involves extending the business to locations around the world to make the most cost effective use of global resources.
Rob Pfrogner, Manager, Virtela Communications Jul 15 2008 2:23PM Security
IDC: What CIOs’ want in their 2008 IT shopping carts

IDC: What CIOs’ want in their 2008 IT shopping carts

In 2008, CIO investment dollars will focus on improving internal business/technology processes, business reporting and information management, infrastructure and communicating with partners, suppliers and customers, according to IDC's Forecast for Management (FFM) Survey.
a Staff Writer Mar 26 2008 12:21PM Financial Services
Guest column: The Saas Trap - What you need to consider before moving to SAAS

Guest column: The Saas Trap - What you need to consider before moving to SAAS

Adoption of the software-as-a-service (SaaS) sales model is accelerating at a phenomenal rate in the region, changing the way vendors do business and the way organisations use software.
Paul K. Berger Jan 31 2008 3:11PM Software
How do you protect what you don't know exists?

How do you protect what you don't know exists?

Almost every day there is news of a company's security breach and, increasingly, many of these incidents are originating from an employee or other internal source.
Alex Gorelik Jan 29 2008 9:30AM Security
Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

You’re paying your application developers to write code. But are they doing what you’re paying them to do?
Eldad Maniv Dec 20 2007 11:02AM Software
Practice what you preach, even at a security conference

Practice what you preach, even at a security conference

Webster defines security as, "the quality or state of being free from risk of loss and that measures [are] taken to guard against espionage or sabotage, crime, attack or escape."
Randall Durfy Jul 24 2007 9:13AM Security
What does a data breach cost?

What does a data breach cost?

This Friday, 5:45pm - Your company's star financial analyst is on her way home and needs to drop by the grocery store to pick up dinner. On the passenger's seat is her laptop, freshly loaded with the customer database to help prepare a report for Monday.
Kevin Bocek, Jul 19 2007 3:53PM Security
Crime watch: What the world's top experts think you should be worried about

Crime watch: What the world's top experts think you should be worried about

Nine experts from Australia and around the world sound off on where security threats are headed, and what we can do about it. Negar Salek asks the experts for advice.
Negar Salek Oct 23 2006 12:16PM Security
What pill can I take for cyber insecurity?

What pill can I take for cyber insecurity?

Ahhhhh, the internet. We are hooked, and we better be prepared for the consequences. Real dollars are being lost, identities are being stolen, botnets are running rampant, consumer ATM cards are being compromised, spam is jamming our inboxes, the press is reporting stories that contribute to consumer cyber fears, and mankind again finds itself waging a protracted war — this time against internet insecurity.
Kevin Mandia Jul 6 2006 8:31PM Security
Now what about the other spyware?

Now what about the other spyware?

Sony-BMG Entertainment still hasn’t addressed the other half of its use of spyware-like technology on CD-Roms, one blogger familiar with the software pointed out this week.
Frank Washkuch Nov 29 2005 10:27PM Security
Be careful what you measure

Be careful what you measure

Quality-assurance audits are a bit like visits to the dentist; you know you need them, and that they will do you good, but that doesn't make the day itself any more fun. A recent audit I was involved in brought with it the usual flurry of activity to close off outstanding actions and generate the relevant reports.

Nick Barron Nov 10 2005 4:23PM Security
MSN hacked! What a Korea-on!

MSN hacked! What a Korea-on!

Hackers have infected a Microsoft website and inserted a program capable of downloading pop-up adverts that could contain viruses.
David Quainton Jun 3 2005 5:10PM Security
Sober hits hard come what May

Sober hits hard come what May

Virus-infected email rose almost four-fold in May as the Sober virus took hold.
David Quainton Jun 2 2005 11:23AM Security
What it comes down to is risk

What it comes down to is risk

Any good information security program should always relate to the business case and its tolerance for risk. The risk tolerance of an organization is the baseline that the program should address, including any additional legal requirements.
Kevin Dickey, Apr 18 2005 12:45PM Security
What you measure is what you get

What you measure is what you get

Creating Information Security Performance Measures: Five Recommendations for CIOs and CISOs
Edward Schwartz Jan 5 2005 2:07PM Security

Log In

  |  Forgot your password?