why

Why user provisioning matters

Why user provisioning matters

All it takes is a single employee to bring an organisation's network to its knees.
Martin Hack, executive vice president, NCP Engineering Jul 6 2010 3:33PM Security
Interview: Why we need more ideas

Interview: Why we need more ideas

Guy Kawasaki talks venture capital, CIOs and social media.
Angelica Mari Sep 28 2009 7:11AM Strategy
Why do Brits love open source?

Why do Brits love open source?

UK is the sixth most open-source software-friendly country in the world - behind Australia, according to research.
Martin Courtney Apr 27 2009 6:52AM Software
Opinion: Why national Internet filters are pointless

Opinion: Why national Internet filters are pointless

It seems that the world plus dog is falling over itself to filter the World Wide Web in a desperate bid to protect children from things they can handle on their own.
Nick Farrell Jan 22 2009 6:26AM Telco/ISP
Opinion: Why SMBs cannot afford to ignore BPM

Opinion: Why SMBs cannot afford to ignore BPM

Paul Berger, managing director of Australian owned business software company, Happen Business, (pictured), talks to CRN about Business Process Management.
Staff Writers Nov 24 2008 3:04PM Strategy
Why biometric technologies are catching on

Why biometric technologies are catching on

Today's world has an unprecedented need for security. From restricting access to physical resources, such as buildings and facilities, to controlling access to IT resources such as computers and networks.
Staff Writers Nov 7 2007 2:45PM Security
Why it’s better to re-use than recycle

Why it’s better to re-use than recycle

Few would question the need to recycle old hardware, but some experts argue that there is a stronger environmental and economic case for extending the useful life of IT equipment by donating it to projects in the developing world
James Murray Sep 17 2007 10:33AM Hardware
Why Vista missed the trick

Why Vista missed the trick

A project that aims to provide laptops for poor children could teach Microsoft a thing or two about security and design.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 24 2007 5:01PM Security
Opinion: Why SaaS is the future of software delivery

Opinion: Why SaaS is the future of software delivery

WebEx Australia director Kevin Mackin argues that SaaS offers a way to avoid IT costs blowouts.
Staff Writers Mar 2 2007 12:49PM Software
Why is my spam in colour?

Why is my spam in colour?

Today one out of four emails on the internet is an image spam message. This is not because spammers have just realised the marketing benefits of captive colours. Instead, this is because the spammers have identified a weakness in many anti-spam systems and are moving diligently to maximise this opportunity by fully exploiting this weakness.
Paul Judge, Feb 12 2007 7:31PM Security
Malicious World Cup website ponders why Zidane did it

Malicious World Cup website ponders why Zidane did it

In just a few weeks, Zinedine Zidane has gone from revered soccer superstar to demonized World Cup goat to bait for malicious code.
Frank Washkuch Jul 17 2006 7:44PM Security
Researchers detail why phishing works

Researchers detail why phishing works

Researchers from Harvard University and the University of California at Berkeley released a paper last week on why users fall for phishing scams, concluding that current anti-phishing deterrents are ineffective.
Ericka Chickowski Apr 6 2006 9:57PM Security
Why is your network firewall falling short?

Why is your network firewall falling short?

Your network is secure, your servers are safe, and you’ve done everything to protect your network, corporate assets and intellectual property. You have a network firewall, so your perimeter is secure. Your network devices and servers are only accessible through your corporate VPN via two-factor authentication, and all external ports are blocked to non-authenticated traffic.
Alan Murphy Dec 15 2005 11:54AM Security
Why technology is a risky business

Why technology is a risky business

Lloyd Hession Nov 11 2005 10:53AM Security
Why biometrics might just bite back

Why biometrics might just bite back

Tim Mather Aug 26 2005 2:00PM Security
That's why the lady is a scam

That's why the lady is a scam

Phishers trying to find new ways to extort users are tugging on the heart strings with the story of a wheelchair-bound senior citizen.
David Quainton Aug 12 2005 2:31PM Security
Why IPS won't break your network

Why IPS won't break your network

Back in 2003 Gartner declared Intrusion Detection Systems (IDS) as dead. Whether this is true, it is an increasing reality that intrusion protection or prevention systems are increasingly becoming a part of many company's networks. While IDS may be waning, IPS (Intrusion Protection Systems) are on the up, yet there is still a pervasive feeling that such technology can cause a network to break or malfunction.
Simon Smith Jul 12 2005 11:28AM Security
Why good business is also good security

Why good business is also good security

February is a big month for SC Magazine this year. We'll be having our SC Magazine Awards ceremony and dinner for the first time in the U.S. on February 16 during the RSA Conference at San Francisco's Moscone Center. It is, by far, the biggest and swankiest event by which excellence in all things IT security is acknowledged.
Illena Armstrong Feb 22 2005 5:36PM Security
Why standards are important for wireless security

Why standards are important for wireless security

Industry standards play a critical role in R&D, product development and marketing initiatives which in turn help organizations meet their business objectives.
Staff Writers Feb 7 2005 11:33AM Security
Why should anti-virus products employ heuristic detection?

Why should anti-virus products employ heuristic detection?

Once upon a time, in a galaxy not so far away, there were only a few computer viruses. Little more than a curiosity to most, they were relatively rare, slow spreading and in general, more of a mythological threat than a real one. The initial anti-virus products that were created to deal with these were perfectly adequate; updated once a month or so, the customers could be fairly sure that they would be protected. Fast-forward to today’s interconnected and always-on world, and the scale of the problem is orders of magnitude above where it was back in those early days.
Staff Writers Nov 24 2004 2:47PM Security

Log In

  |  Forgot your password?