when

How can you be confident when the endgame stakes are increasing?

How can you be confident when the endgame stakes are increasing?

IT personnel need to take more of an integrated approach.
Devin Anderson, product line manager for Security Suite, Jun 28 2010 11:21AM Security
Q&A: What happens when your cloud bursts?

Q&A: What happens when your cloud bursts?

No supplier is too big to fail, says Gartner's Steve Prentice.
Martin Courtney Mar 29 2010 6:59AM Strategy
When ghosts spam

When ghosts spam

Most spam is sent to non-existent addresses, but that can still generate annoying messages for genuine users.
Ian Castle May 6 2008 2:23PM Security
Fingerprinting visitors when they leave US

Fingerprinting visitors when they leave US

The federal Department of Homeland Security plans to establish a biometric exit program at all airports and seaports in the United States.
Chuck Miller Apr 25 2008 12:32PM Security
Know your privacy rights when using online social networking: Privacy Commissioner

Know your privacy rights when using online social networking: Privacy Commissioner

The Privacy Commissioner Karen Curtis has entered the privacy debate surrounding social networking sites announcing a new FAQ section on its website that helps minimise risks associated with the activity.
Staff Writers Dec 19 2007 12:09PM Security
Security firm urges caution when donating online

Security firm urges caution when donating online

Internet users are being urged to exercise caution when making online donations to charitable causes, such as today's Children in Need appeal.

Staff Writers Nov 19 2007 2:08PM Security
Mozilla to patch Firefox flaw, vulnerable with Internet Explorer

Mozilla to patch Firefox flaw, vulnerable with Internet Explorer

Mozilla is set to patch a flaw in Firefox that can be exploited when the program is sent malicious data by Internet Explorer (IE).
Frank Washkuch Jul 12 2007 9:32AM Security
When Smart Phones meet Smart Attacks

When Smart Phones meet Smart Attacks

The scene is set in a dark and gothic basement, somewhere in Russia apparently. Amid the clicking of a keyboard the following chilling statement of intent can be heard; “Let’s see what an application that simultaneously opens up 1000 windows does to a smartphone today, da? Mwahahaha, er, ha!” (Cue bolt of lightning).
Simon Edmed Jan 26 2005 2:41PM Security
Privacy laws will work when they are enforced

Privacy laws will work when they are enforced

Illena Armstrong Nov 12 2004 4:53PM Security
When it comes to wireless security, good enough is simply not good

When it comes to wireless security, good enough is simply not good

As security threats increase in quantity and complexity, assuring business continuity means that corporations need to aggressively and proactively protect the entire network infrastructure.
Bethany Mayer Sep 15 2004 10:52AM Security
Director flees ASIC when distributor goes broke

Director flees ASIC when distributor goes broke

A Sydney-based IT distributor found trading while insolvent is being wound up by the courts after its director disappeared and angry customers brought the situation to the attention of authorities.
Fleur Doidge Aug 17 2004 12:00AM Financial Services
When the root is the problem

When the root is the problem

As Linux grows in popularity with both users and hackers, Richard Williams contemplates precisely how risky all or nothing security is
Richard Williams Apr 15 2004 11:11AM Security
When Worlds Collide: Physical and Information Security

When Worlds Collide: Physical and Information Security

Information security and physical security are frequently viewed as either conflicting or as far removed from one another as the sun is from the moon.
Thresa Lang Jan 16 2004 11:34AM Security
When the Hackers Come Knocking

When the Hackers Come Knocking

When a computer has been hacked, the first reaction of the system administrator is usually to restore the system and bring it back online as soon as possible.
the Interpol Jan 16 2004 10:42AM Security
Winning The Virus War - But When?

Winning The Virus War - But When?

Gone are the days when a careless user would infect their machine with a rogue floppy disk, and we’d all look on in dismay as the data disappeared and the monitor went blank.
Jayne Parkhouse Jan 16 2004 10:22AM Security
What Happens When Email Goes Wrong?

What Happens When Email Goes Wrong?

You may think that sending an email is safe enough.
Steven Jenkins Jan 15 2004 1:21PM Security
“When spammers attack!”

“When spammers attack!”

In the summer of 2003 a new email virus hit the front pages of the newspapers worldwide.
Mark Sunner Jan 9 2004 12:58PM Security

Log In

  |  Forgot your password?