your

Q&A: What happens when your cloud bursts?

Q&A: What happens when your cloud bursts?

No supplier is too big to fail, says Gartner's Steve Prentice.
Martin Courtney Mar 29 2010 6:59AM Strategy
Opinion: Five steps to achieving your e-commerce goals

Opinion: Five steps to achieving your e-commerce goals

Brian Walker of Forrester Research gives his top tips for ensuring e-commerce success.
Forrester Research Jul 7 2009 6:24AM Strategy
Opinion: Turning IT advances to your advantage

Opinion: Turning IT advances to your advantage

New IT initiatives rarely deliver unless they dovetail with overall business strategy, writes UPS IT director Nick Gray.
Nick Gray Feb 21 2009 7:45AM Strategy
Opinion: Support your IT ideas with action

Opinion: Support your IT ideas with action

Innovation has become one of the most over-used words in technology, but it remains perhaps the most important one in IT leaders’ vocabulary.
Computing staff Feb 9 2009 6:51AM Strategy
Who has your data?

Who has your data?

Businesses not only need to be focused on their intranets but they also need to be vigilant to their outsourced data flow.
Ian Castle Oct 15 2008 3:35PM Security
Malware writers go for your gold during the Olympics

Malware writers go for your gold during the Olympics

Malware purveyors are embracing the upcoming Olympic games wholeheartedly.
Shaun Nichols Aug 7 2008 2:20PM Security
Secure Computing warns Olympic Fever could impact your network

Secure Computing warns Olympic Fever could impact your network

The 2008 Beijing Olympics are nearly upon us. And for the first time employees will be able to watch the games via live streaming through a local host – Channel Seven will be streaming over 100 hours of footage from the Games via Yahoo!7.

Dylan Bushell-Embling Jul 4 2008 1:18PM Security
Tiny GPS spy in your pocket keeps track

Tiny GPS spy in your pocket keeps track

A company called QStarz has just unveiled a tiny portable GPS tracker, which it claims will not only be able to show you where you are and where you’re going, but also tracks your trip so you can upload your travel map to a blog.
Sylvie Barak Jun 23 2008 3:58PM Hardware
Is your router rooted?

Is your router rooted?

Could firmware infections during the manufacturing process create backdoors in your network?
Ken Munro May 7 2008 11:27AM Security
Blogging may be bad for your health

Blogging may be bad for your health

Some of the blogging community are worried that blogging for a living could be bad for your health..
Iain Thomson Apr 8 2008 3:33PM Software
Protecting your data from the Trojan force

Protecting your data from the Trojan force

So many application-level zero-day exploits exist today that the question is not whether your computers are safe but what's already running on them.
Marco Peretti Apr 8 2008 8:26AM Security
Protect your site from malware, warns Forrester

Protect your site from malware, warns Forrester

A new report by analyst firm Forrester Research has again highlighted the growing threat to firms of their web sites being infected by malware and their brands being abused in sophisticated phishing attacks.
Phil Muncaster Mar 27 2008 3:03PM Security
DVD Jon to 'liberate your media'

DVD Jon to 'liberate your media'

DoubleTwist Corporation, the company formed by infamous hacker DVD Jon, unveiled its first product today, described as a platform "devoted to helping consumers liberate their media"..
Clement James Feb 21 2008 3:10PM Software
Building security into your software-development lifecycle

Building security into your software-development lifecycle

You have probably heard by now that the root cause of most security vulnerabilities is in the software we run, and that these vulnerabilities are introduced into the software during the development process. That much has been well understood for several years. What hasn't been well understood is the solution to the problem.
Chris Wysopal Feb 18 2008 4:08PM Security
Guest column: Proving the value of your iInvestment with ROI

Guest column: Proving the value of your iInvestment with ROI

In life, as in business, you continually make decisions about purchases by considering the value you’ll get from your investment. Whether you are evaluating which stock or mutual fund to add to your retirement portfolio, considering different real estate options, or contemplating what kind of car to buy, you most likely begin by comparing several possible choices. Then you might try to project the value that each option will deliver for your investment.
Mary Nugent and Marina Yesakova Feb 14 2008 10:47AM Strategy
 Preventing security breaches from inside your private network

Preventing security breaches from inside your private network

Too often, network security relies on placing firewalls in front of public network access points and calling it a day. The assumptions are 1) being on a private network is synonymous with being on campus 2) campus users are implicitly trustworthy and 3) external threats are mitigated by the perimeter firewall.
Jan 16 2008 4:15PM Security
Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

You’re paying your application developers to write code. But are they doing what you’re paying them to do?
Eldad Maniv Dec 20 2007 11:02AM Software
Know your privacy rights when using online social networking: Privacy Commissioner

Know your privacy rights when using online social networking: Privacy Commissioner

The Privacy Commissioner Karen Curtis has entered the privacy debate surrounding social networking sites announcing a new FAQ section on its website that helps minimise risks associated with the activity.
Staff Writers Dec 19 2007 12:09PM Security
Be smart with your phone

Be smart with your phone

As we start to pay bills and surf the web from our mobile phones, it's not the handsets thieves will be after.
Ken Munro Oct 5 2007 8:04AM Security
Market your security competencies

Market your security competencies

Historically, IT security has been a business cost centre.
Jay Barbour, Aug 28 2007 9:21AM Security

Log In

  |  Forgot your password?