what

Branch office security: What are the real problems?

Branch office security: What are the real problems?

Organisations need not overlook security at their satellite office locations.
Jun 15 2010 10:36AM
Q&A: What happens when your cloud bursts?

Q&A: What happens when your cloud bursts?

No supplier is too big to fail, says Gartner's Steve Prentice.
Mar 29 2010 6:59AM
Citigroup wonders what to do with redundant gear

Citigroup wonders what to do with redundant gear

When Citigroup announced that it was handing redundancies to more than 52,000 workers, few wondered what was going to happen to all those people's kit.
Nov 21 2008 6:39AM
What you need to know to keep Mac OS X secure

What you need to know to keep Mac OS X secure

Just a few years ago, Apple commanded only a small fraction of the computer market.
Sep 22 2008 4:12PM
Myspace suicide woman 'did what loads of people do online'

Myspace suicide woman 'did what loads of people do online'

Missouri mother Lori Drew’s lawyer is now arguing that if she is guilty, then so are millions of other internet users every day.
Jul 25 2008 9:32AM
What you must know about network security before going global

What you must know about network security before going global

Globalisation involves extending the business to locations around the world to make the most cost effective use of global resources.
Jul 15 2008 2:23PM
IDC: What CIOs’ want in their 2008 IT shopping carts

IDC: What CIOs’ want in their 2008 IT shopping carts

In 2008, CIO investment dollars will focus on improving internal business/technology processes, business reporting and information management, infrastructure and communicating with partners, suppliers and customers, according to IDC's Forecast for Management (FFM) Survey.
Mar 26 2008 12:21PM
Guest column: The Saas Trap - What you need to consider before moving to SAAS

Guest column: The Saas Trap - What you need to consider before moving to SAAS

Adoption of the software-as-a-service (SaaS) sales model is accelerating at a phenomenal rate in the region, changing the way vendors do business and the way organisations use software.
Jan 31 2008 3:11PM
How do you protect what you don't know exists?

How do you protect what you don't know exists?

Almost every day there is news of a company's security breach and, increasingly, many of these incidents are originating from an employee or other internal source.
Jan 29 2008 9:30AM
Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

You’re paying your application developers to write code. But are they doing what you’re paying them to do?
Dec 20 2007 11:02AM
Practice what you preach, even at a security conference

Practice what you preach, even at a security conference

Webster defines security as, "the quality or state of being free from risk of loss and that measures [are] taken to guard against espionage or sabotage, crime, attack or escape."
Jul 24 2007 9:13AM
What does a data breach cost?

What does a data breach cost?

This Friday, 5:45pm - Your company's star financial analyst is on her way home and needs to drop by the grocery store to pick up dinner. On the passenger's seat is her laptop, freshly loaded with the customer database to help prepare a report for Monday.
Jul 19 2007 3:53PM
Crime watch: What the world's top experts think you should be worried about

Crime watch: What the world's top experts think you should be worried about

Nine experts from Australia and around the world sound off on where security threats are headed, and what we can do about it. Negar Salek asks the experts for advice.
Oct 23 2006 12:16PM
What pill can I take for cyber insecurity?

What pill can I take for cyber insecurity?

Ahhhhh, the internet. We are hooked, and we better be prepared for the consequences. Real dollars are being lost, identities are being stolen, botnets are running rampant, consumer ATM cards are being compromised, spam is jamming our inboxes, the press is reporting stories that contribute to consumer cyber fears, and mankind again finds itself waging a protracted war — this time against internet insecurity.
Jul 6 2006 8:31PM
Now what about the other spyware?

Now what about the other spyware?

Sony-BMG Entertainment still hasn’t addressed the other half of its use of spyware-like technology on CD-Roms, one blogger familiar with the software pointed out this week.
Nov 29 2005 10:27PM
Be careful what you measure

Be careful what you measure

Quality-assurance audits are a bit like visits to the dentist; you know you need them, and that they will do you good, but that doesn't make the day itself any more fun. A recent audit I was involved in brought with it the usual flurry of activity to close off outstanding actions and generate the relevant reports.

Nov 10 2005 4:23PM
MSN hacked! What a Korea-on!

MSN hacked! What a Korea-on!

Hackers have infected a Microsoft website and inserted a program capable of downloading pop-up adverts that could contain viruses.
Jun 3 2005 5:10PM
Sober hits hard come what May

Sober hits hard come what May

Virus-infected email rose almost four-fold in May as the Sober virus took hold.
Jun 2 2005 11:23AM
What it comes down to is risk

What it comes down to is risk

Any good information security program should always relate to the business case and its tolerance for risk. The risk tolerance of an organization is the baseline that the program should address, including any additional legal requirements.
Apr 18 2005 12:45PM
What you measure is what you get

What you measure is what you get

Creating Information Security Performance Measures: Five Recommendations for CIOs and CISOs
Jan 5 2005 2:07PM

Log In

Email:
Password:
  |  Forgot your password?