why

Why it’s time to get physical with your computer

Why it’s time to get physical with your computer

Nick Barron Nov 12 2004 4:55PM Security
Why every business needs an SCM strategy

Why every business needs an SCM strategy

Running a business has changed a lot over time—businesses are increasingly becoming more global in nature and constantly taking advantage of technology to help them become more efficient, cost conscious and competitive.
Zoe Lowther Oct 19 2004 5:46PM Security
Why strong walls are not enough

Why strong walls are not enough

The crucial job of guarding your enterprise’s network used to boil down to keeping the bad guys out. But as Marcia Savage explains, with wireless, web and remote access, protecting the perimeter is just the start of it
Marcia Savage Aug 5 2004 2:26PM Security
Why storage has to be for keeps

Why storage has to be for keeps

As the vulnerability of stored data grows, and legislation is passed to protect users, senior managers now face the threat of fines and even jail if data is lost on their watch. Failure is not an option, as Illena Armstrong reports
Illena Armstrong Aug 5 2004 1:07PM Security
Why are people ignoring the danger posed by blended threats?

Why are people ignoring the danger posed by blended threats?

Cisco’s recent announcement that it will incorporate Trend Micro virus and worm technologies with its intrusion-detection system software used on its routers and switches, is excellent news for anyone concerned with IT security. With the rise of more sophisticated attacks – blended threats - a more proactive approach to security is not just necessary, but vital. This is an approach we've been taking for two years now, so it’s always pleasing to see Cisco validating our market by adopting it in such a way.
Bruce Hendrix Jun 21 2004 4:40PM Security
Why spammers spam

Why spammers spam

With over 65 per cent of all e-mail traffic circulating on the internet today being spam, there must be reasons why people choose this particular career path and risk arrest as well as being labeled as a spammer.
Francois Bourdeau Jun 1 2004 12:14PM Security
Why pink and fluffy are the new watchwords

Why pink and fluffy are the new watchwords

When the speaker at the front of the room announced that security was really about “pink, fluffy stuff,” I started looking for the exit. And I am sure I was not the only one.
Ron Condon Apr 13 2004 4:27PM Security
Why improved security is well worth waiting for

Why improved security is well worth waiting for

What would you prefer, smart new software now, or error-free software later? Think hard before answering.
Ron Condon Mar 12 2004 12:34PM Security
Why Business Continuity Planning is Difficult

Why Business Continuity Planning is Difficult

In the wake of September 11 companies have been scrambling to review and update their disaster recovery and business continuity plans.
Bob Lonadier Jan 16 2004 2:48PM Security
Calculating PKI Return on Investment - Why Is It So Difficult?

Calculating PKI Return on Investment - Why Is It So Difficult?

Companies invest millions of dollars into public key infrastructure (PKI) products and services; yet demonstrating a return on that investment can prove difficult.
Robert Lonadier Jan 16 2004 10:18AM Security
Why Application Security is the New Threat

Why Application Security is the New Threat

As the use and exploitation of the Internet matures, so does its need for security.
Dan Cuthbert Jan 15 2004 2:10PM Security
PKI - Why Go Through the Hassle?

PKI - Why Go Through the Hassle?

As email increasingly substitutes for the use of letters and faxes, even in government departments, and as commercial transactions on the web get more and more important, the need for secure communications grows.
Guy Vancollie Jan 15 2004 10:46AM Security
Why Can’t Our Guys Do This?

Why Can’t Our Guys Do This?

When computer forensics is an essential component of an internal investigation, lack of familiarity with the legal and technical issues involved can prompt management to assign that component to its management information security staff.
Stevens R. Jan 9 2004 4:46PM Security

Log In

  |  Forgot your password?