what

Control what you let in

Control what you let in

Neglecting to watch what you allow into your network can create unnecessary threats, says Lance Braunstein
Lance Braunstein Dec 2 2004 5:31PM Security
Make endpoint security do what it claims it can do

Make endpoint security do what it claims it can do

Staff Writers Nov 12 2004 5:03PM Security
Oracle issues what it calls final offer for PeopleSoft

Oracle issues what it calls final offer for PeopleSoft

Enough may be enough for Oracle. Early this week, the database giant upped its cash bid for PeopleSoft for, what it says is the final time, to US$24 per share up from US$21.
Barbara Darrow Nov 2 2004 12:00AM Software
Beating the social engineering scams: what employees must do to protect company data

Beating the social engineering scams: what employees must do to protect company data

While technology can dramatically reduce the risk associated with threats and vulnerabilities in enterprise IT, the human factor is always critical in a comprehensive security strategy.
John Roese Oct 27 2004 3:27PM Security
What can software asset management do for me?

What can software asset management do for me?

‘It is an irony of modern business that directors pay more attention to the control of assets such as company cars than they do to the management of business critical investments such as IT.’ So says George Cox, director of the IOD. An irony that deepens further still when you realize that many organizations spend more each year on software than they do on their vehicle fleets.
Matt Fisher Sep 29 2004 11:18AM Security
Smartphones are great tools, but at what risk?

Smartphones are great tools, but at what risk?

Hands up if you own a smartphone and feel secure. If so, maybe you haven’t been following the upward trends in Bluetooth vulnerabilities, Symbian worms and ordinary theft.
Jon Tullett Jul 8 2004 4:15PM Security
What Good Is Foreknowledge?

What Good Is Foreknowledge?

U.S. Vice President Dick Cheney was recently on NBC's Meet the Press where he said that the inevitability of another terrorist attack on American soil is as sure today as it was September 12.
Illena Armstrong Jan 16 2004 1:25PM Security
Is Information Security Crossing the Proverbial You Know What?

Is Information Security Crossing the Proverbial You Know What?

Information security is a hot topic these days, something that often gets credited to an increased awareness of terrorism.
Dan Taylor Jan 16 2004 11:37AM Security
New Security Perspectives: What U.S. Firms Can Learn From Overseas

New Security Perspectives: What U.S. Firms Can Learn From Overseas

In today's climate of increasing security concerns, companies are seeking out new policy and practice concepts in addition to new technology upgrades to address vulnerabilities.
Steve Crutchley Jan 16 2004 10:44AM Security
What Happens When Email Goes Wrong?

What Happens When Email Goes Wrong?

You may think that sending an email is safe enough.
Steven Jenkins Jan 15 2004 1:21PM Security
Dedication is what you need?

Dedication is what you need?

In an ideal world, every company would have a dedicated recovery center to ensure information availability 24/7/365. It is the ultimate defense against unforeseen circumstances impacting on critical business functions.
Andrew Waterston Jan 15 2004 11:14AM Security
What to Look for in a Web Application Protection System

What to Look for in a Web Application Protection System

The number of technology pundits decrying the state of Internet security has reached an unbearable level.
Abishek Chauhan Jan 14 2004 3:44PM Security
A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu, Jan 14 2004 3:01PM Security
Digital Signatures: What Can Businesses and Consumers Expect?

Digital Signatures: What Can Businesses and Consumers Expect?

Laws giving digital signatures legal legitimacy have been enacted around the world.
Rett Summerville Jan 14 2004 2:47PM Security
Blackout blues ...and what you can do to avoid them

Blackout blues ...and what you can do to avoid them

The recent power outage was a powerful reminder of the value of business continuity provisions. Ron Mobed reports.
Ron Mobed Jan 13 2004 4:58PM Security
Change Management: What If it All Goes Wrong?

Change Management: What If it All Goes Wrong?

The U.K.’s Swanwick Air Traffic Control center is an unfortunate example of the problems that can occur with the continuity of a business while undergoing a period of change.
Staff Writers Jan 12 2004 1:54PM Security
Selecting the Right PKI - Know What to Ask For

Selecting the Right PKI - Know What to Ask For

When companies search for a public key infrastructure (PKI) solution, most develop and distribute a ‘request for proposal’ to evaluate and select a particular vendor and product.
Kevin LeBlanc Jan 12 2004 10:23AM Security
Hot IT jobs: what are they?

Hot IT jobs: what are they?

Vivienne Fisher Dec 1 2003 12:00AM Training & Development
Phishing, spam, viruses: what next?

Phishing, spam, viruses: what next?

There are an increasing number of warnings being issued to users about the threats associated with spam, such as viruses and 'phishing' scams.
Vivienne Fisher Nov 19 2003 12:00AM Security

Log In

  |  Forgot your password?