your

Q&A: What happens when your cloud bursts?

Q&A: What happens when your cloud bursts?

No supplier is too big to fail, says Gartner's Steve Prentice.
Mar 29 2010 6:59AM
Opinion: Five steps to achieving your e-commerce goals

Opinion: Five steps to achieving your e-commerce goals

Brian Walker of Forrester Research gives his top tips for ensuring e-commerce success.
Jul 7 2009 6:24AM
Opinion: Turning IT advances to your advantage

Opinion: Turning IT advances to your advantage

New IT initiatives rarely deliver unless they dovetail with overall business strategy, writes UPS IT director Nick Gray.
Feb 21 2009 7:45AM
Opinion: Support your IT ideas with action

Opinion: Support your IT ideas with action

Innovation has become one of the most over-used words in technology, but it remains perhaps the most important one in IT leaders’ vocabulary.
Feb 9 2009 6:51AM
Who has your data?

Who has your data?

Businesses not only need to be focused on their intranets but they also need to be vigilant to their outsourced data flow.
Oct 15 2008 3:35PM
Malware writers go for your gold during the Olympics

Malware writers go for your gold during the Olympics

Malware purveyors are embracing the upcoming Olympic games wholeheartedly.
Aug 7 2008 2:20PM
Secure Computing warns Olympic Fever could impact your network

Secure Computing warns Olympic Fever could impact your network

The 2008 Beijing Olympics are nearly upon us. And for the first time employees will be able to watch the games via live streaming through a local host – Channel Seven will be streaming over 100 hours of footage from the Games via Yahoo!7.

Jul 4 2008 1:18PM
Tiny GPS spy in your pocket keeps track

Tiny GPS spy in your pocket keeps track

A company called QStarz has just unveiled a tiny portable GPS tracker, which it claims will not only be able to show you where you are and where you’re going, but also tracks your trip so you can upload your travel map to a blog.
Jun 23 2008 3:58PM
Is your router rooted?

Is your router rooted?

Could firmware infections during the manufacturing process create backdoors in your network?
May 7 2008 11:27AM
Blogging may be bad for your health

Blogging may be bad for your health

Some of the blogging community are worried that blogging for a living could be bad for your health..
Apr 8 2008 3:33PM
Protecting your data from the Trojan force

Protecting your data from the Trojan force

So many application-level zero-day exploits exist today that the question is not whether your computers are safe but what's already running on them.
Apr 8 2008 8:26AM
Protect your site from malware, warns Forrester

Protect your site from malware, warns Forrester

A new report by analyst firm Forrester Research has again highlighted the growing threat to firms of their web sites being infected by malware and their brands being abused in sophisticated phishing attacks.
Mar 27 2008 3:03PM
DVD Jon to 'liberate your media'

DVD Jon to 'liberate your media'

DoubleTwist Corporation, the company formed by infamous hacker DVD Jon, unveiled its first product today, described as a platform "devoted to helping consumers liberate their media"..
Feb 21 2008 3:10PM
Building security into your software-development lifecycle

Building security into your software-development lifecycle

You have probably heard by now that the root cause of most security vulnerabilities is in the software we run, and that these vulnerabilities are introduced into the software during the development process. That much has been well understood for several years. What hasn't been well understood is the solution to the problem.
Feb 18 2008 4:08PM
Guest column: Proving the value of your iInvestment with ROI

Guest column: Proving the value of your iInvestment with ROI

In life, as in business, you continually make decisions about purchases by considering the value you’ll get from your investment. Whether you are evaluating which stock or mutual fund to add to your retirement portfolio, considering different real estate options, or contemplating what kind of car to buy, you most likely begin by comparing several possible choices. Then you might try to project the value that each option will deliver for your investment.
Feb 14 2008 10:47AM
 Preventing security breaches from inside your private network

Preventing security breaches from inside your private network

Too often, network security relies on placing firewalls in front of public network access points and calling it a day. The assumptions are 1) being on a private network is synonymous with being on campus 2) campus users are implicitly trustworthy and 3) external threats are mitigated by the perimeter firewall.
Jan 16 2008 4:15PM
Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

You’re paying your application developers to write code. But are they doing what you’re paying them to do?
Dec 20 2007 11:02AM
Know your privacy rights when using online social networking: Privacy Commissioner

Know your privacy rights when using online social networking: Privacy Commissioner

The Privacy Commissioner Karen Curtis has entered the privacy debate surrounding social networking sites announcing a new FAQ section on its website that helps minimise risks associated with the activity.
Dec 19 2007 12:09PM
Be smart with your phone

Be smart with your phone

As we start to pay bills and surf the web from our mobile phones, it's not the handsets thieves will be after.
Oct 5 2007 8:04AM
Market your security competencies

Market your security competencies

Historically, IT security has been a business cost centre.
Aug 28 2007 9:21AM

Log In

Username / Email:
Password:
  |  Forgot your password?