• Edition
  • United States
  • Africa
  • ASEAN
  • Australia
  • Canada
  • India
  • Ireland
  • Middle East
  • Netherlands
  • New Zealand
  • United Kingdom
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
Skip to content
  • Menu
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
  • SIGN IN
  • REGISTER

Learn about Insider

Help

Member Preferences

Hot Topics
  • IT Leadership
  • Digital Transformation
  • Innovation
  • Data Analytics & AI
  • Enterprise Applications
  • Diversity and Inclusion

IT Strategy

News

The Global State of Information Security 2006: Big Firms vs. Small Firms.

When it comes to security, bigger isn’t always better.Sure, large companies tend to have more strategic and effective security operations …
By Allan HolmesSep, 15 2006
News

Microsoft Preps Protocol for Grid Computing

Microsoft is developing a security language for grids, designed to deal with some of the security issues raised by grids’ …
By CIO StaffSep, 14 2006
News

Phishing Attack Detected Against Barclays Bank Clients

PandaLabs has detected a large-scale phishing attack targeting clients of Barclays Bank’s online services, and involving at least 61 variants …
By CIO StaffSep, 14 2006
News

Microsoft Patches New Office Flaw

Microsoft has released its monthly set of security patches, fixing a critical flaw in Office.Attackers could exploit the bug by …
By CIO StaffSep, 13 2006
News

Lawmakers: U.S. Lacks Cybersecurity Leadership

The U.S. Department of Homeland Security (DHS) has failed to take several basic steps to protect the nation’s cyber infrastructure, …
By CIO StaffSep, 13 2006
News

Microsoft Patches Same Explorer Hole for 3rd Time

Among the security patches released by Microsoft Tuesday is an Internet Explorer fix that is now being distributed for the …
By CIO StaffSep, 13 2006
News

Report: 2 Moroccans Jailed for Releasing Zotob Worm

Two Moroccan men have been jailed for releasing the Zotob computer worm, which wreaked havoc on an estimated 250,000 Windows …
By CIO StaffSep, 13 2006
News

Juniper, Symantec Team for Enterprise Security

Juniper Networks and Symantec will jointly work on unified threat management (UTM) and intrusion detection and prevention (IDP) products, and …
By CIO StaffSep, 12 2006
News

Lucent Firewalls Get a Speed Boost

Lucent Technologies is putting the pedal to the metal in its new VPN firewalls for carriers and large enterprises.On Monday, …
By CIO StaffSep, 12 2006
News

Enterprise Security Spending Up Since 9/11

For years, Roy Bordes has been attending corporate security conventions at which exhibitors push video surveillance, alarm systems or bullet-resistant …
By CIO StaffSep, 11 2006
News

9/11: IT Security Then and Now

Since terrorists attacked the United States on Sept. 11, 2001, the government has begun a robust, and oft-criticized, electronic-surveillance program, but …
By CIO StaffSep, 11 2006
News

Record Number of Phishing Sites Seen in July

Cybercriminals created a record number of phishing websites in July and also hijacked a record number of brands to help …
By CIO StaffSep, 11 2006
News

IT Security Lags Five Years After Sept. 11

1. "IT Security Lags Five Years After Sept. 11,"InfoWorld, 9/7. It’s nearly five years since the deadly terrorist …
By CIO StaffSep, 8 2006
News

CIOs Need Say in Security Legislation

With privacy and security breaches now making news almost daily, there has been a recent spate of legislation aimed at …
By CIO StaffSep, 6 2006
News

Algorithms to Calculate Terrorist Behavior

National ICT Australia (NICTA) scientists are developing advanced surveillance technologies including software algorithms to track "inappropriate behavior" in public places.The …
By CIO StaffSep, 1 2006
News

Hitachi Targets Cars, Videos With New Hard Disks

Hitachi hopes to win market share from rival Toshiba with three new high-capacity hard drives that will reach the digital …
By CIO StaffSep, 1 2006
News

Security – First Phishing, Now Vishing

Now that identity thieves have almost perfected phishing, they’ve moved on to “vishing”: Scammers are using voice-over-IP (VoIP) telephone numbers …
By Grant GrossSep, 1 2006
News

FBI Demos Terrorism Database

The FBI has constructed a database that houses upwards of 659 million terror-related records drawn from more than 50 of …
By CIO StaffAug, 30 2006
News

Man Gets 19 Years for Child Porn Charges

A Wichita, Kan., man was sentenced to 19 years in prison Tuesday after sharing child pornography videos in a Yahoo …
By CIO StaffAug, 30 2006
News

AT&T Web Store Hacked, Up to 19K Affected

AT&T confirmed Tuesday that its online store had been hacked and the credit card information and personal data of up …
By CIO StaffAug, 30 2006
News

AOL 9.0 Accused of 'Badware Behavior'

AOL’s free Internet client software has earned the company a slap on the wrist from StopBadware.org, a consortium set up …
By CIO StaffAug, 28 2006
News

Microsoft 'Longhorn' Aims for Server Security

While not due for general release until this time next year, Microsoft’s next-generation server platform, code-named Longhorn, will be a …
By CIO StaffAug, 24 2006
News

BEA to Make India Its R&D Hub

Enterprise infrastructure software vendor BEA Systems plans to make India its worldwide R&D hub, to take advantage of the highly …
By CIO StaffAug, 24 2006
News

Sophos Offers Free Rootkit Detection Tool

Sophos has released a free tool to help PC users root out rootkits.Called Sophos Anti-Rootkit, the software will detect and …
By CIO StaffAug, 23 2006
News

IBM's ISS Bid to Broaden Security Portfolio

IBM’s move to buy Internet Security Systems (ISS) is another example of the company’s strategy to grow its product offerings …
By CIO StaffAug, 23 2006
News

Microsoft's August IE Patch Contains Security Bug

Instead of making the browser more secure, Microsoft’s August Internet Explorer security update introduced a critical security bug, according to …
By CIO StaffAug, 23 2006
News

Microsoft, Citrix to Team on New Security Appliance

Microsoft and Citrix Systems plan to co-develop a new line of branch office appliances that will combine Microsoft’s Internet Security …
By CIO StaffAug, 23 2006
News

Microsoft Fixes Memory Bug in Security Patch

Microsoft has fixed a bug in a critical security patch that may have been causing problems for some Windows Server …
By CIO StaffAug, 21 2006
News

Microsoft: Asian Countries to Lead Tech R&D

Asian countries are playing a bigger role than ever before in the development of new technologies, and the region’s importance …
By CIO StaffAug, 18 2006
News

Japanese Internet Crimes Hit Record High

The number of Internet-related crimes in Japan in the first six months of this year hit a record high, according …
By CIO StaffAug, 17 2006
News

U.K.-to-D.C. Flight Diverted to Boston Due to Unruly Passenger (UPDATED)

Since this story was originally reported, it has been updated to include the Transportation Security Administration’s rebuke of the report mentioning …
By CIO StaffAug, 16 2006
News

Cisco Can't Reproduce Black Hat Flaw

Cisco Systems has been unable to reproduce a security flaw reported in its PIX firewall appliance earlier this month, the …
By CIO StaffAug, 16 2006
News

Apple Updates Mac Pro Security

Apple has released Security Update 2006-004 for Mac Pro and Mac OS X Server v10.4.7 (Universal).The company recommends all users …
By CIO StaffAug, 10 2006
News

Google: AOL Breach Wouldn't Happen at Our Co.

The release of a database of online search histories that has gotten AOL into so much hot water could never …
By CIO StaffAug, 10 2006
News

Microsoft Patch Prompts DHS Warning

The U.S. Department of Homeland Security (DHS) warned Wednesday that a recently patched Microsoft Windows vulnerability could put the nation’s …
By CIO StaffAug, 10 2006
News

Microsoft Plays Down Bug Panic

Windows exploit code recently released into the wild is causing confusion in the security world, as it seems to overlap …
By CIO StaffAug, 2 2006
News

Apple Issues Mac Security Update

Apple has released a new batch of security updates for Mac OS X 10.3.9 and 10.4.7 client and server Macs.The …
By CIO StaffAug, 2 2006
News

Hackers Outfox Mozilla's Firefox

An exploit in Mozilla’s Firefox browser has been found that can hijack the software and monitor submit-and-click events.The Infostealer.Snifula, which …
By CIO StaffAug, 1 2006
Feature

The Quest for Customer Data Integration

Smart CIOs are experimenting with new Web-based technologies to integrate their customer data applications without having to rip out their legacy systems. But before they plunge into the implementation, they need to craft a data management strategy.
By Thomas WailgumAug, 1 2006
News

Crisis Management: 4 Not-So-Great Moments in Crisis Management

Covering up After a burglary at the headquarters of the Democratic National Committee in the Watergate apartment complex in …
By CIO StaffAug, 1 2006
News

London Terrorist Bombing and Business Continuity

On the morning of July 7, 2005, Kenneth McCrae left his hotel in central London and headed for Baker Street …
By Susannah PattonAug, 1 2006
News

Authentication Technology Uses Typing Rhythm

What’s the best way to ID a DJ? This is a question that John Heaven thought long and hard about …
By Robert McMillanAug, 1 2006
News

How to Secure an iSCSI SAN

SANs based on Internet Small Computer System Interface (iSCSI) can present some daunting security risks to today’s mid-market companies.
By Cindy WaxerAug, 1 2006
News

McAfee to Issue Patch on Wednesday for Vulnerability

McAfee will issue a patch on Wednesday for a vulnerability affecting its SecurityCenter application, a security software management tool.The vulnerability, …
By CIO StaffAug, 1 2006
News

India Attractive Offshore Location Despite Wage Hikes

India is still an attractive offshore location for software development and other IT services, despite increasing staff salaries, according to …
By CIO StaffJul, 27 2006
News

Huawei, Motorola to Set Up 3G Lab in Shanghai

Motorola and Chinese telecommunications equipment maker Huawei Technologies plan to establish a research and development center in Shanghai as part …
By CIO StaffJul, 26 2006
News

Trojan Cloaks Itself as Firefox Extension

Security vendor McAfee has detected a new piece of malicious software that masquerades as part of the Firefox Internet browser.McAfee …
By CIO StaffJul, 26 2006
News

CIO Council Releases Updated Info-Sharing Guide

The federal CIO Council released the third version of its Federal Enterprise Architecture Security and Privacy Profile, which is meant to assist …
By CIO StaffJul, 25 2006
News

Crypto Malware Nearly 'Uncrackable'

File-encrypting Trojans are becoming so complex that security companies could soon be powerless to reverse their effects, a new report …
By CIO StaffJul, 25 2006
News

Yahoo, Symantec Team Up for Security Service

Yahoo and Symantec on Monday announced the availability of a new co-branded Web security service that will better position both …
By CIO StaffJul, 25 2006
Previous 1 … 48 49 50 51 52 53 54 55 56 … 59 Next
RESOURCES
  • Enterprise Procurement Playbook
  • Honeywell Case Study
  • Empower Employees with Digital Purchasing Webinar
  • Resilience through Rainstorms – How Unum weathers any storm with VSM
  • The Path to AI Majority
VIEW ALL
BrandPosts Learn More
×

BrandPosts are written and edited by members of our sponsor community. BrandPosts create an opportunity for an individual sponsor to provide insight and commentary from their point-of-view directly to our audience. The editorial team does not participate in the writing or editing of BrandPosts.

  • Sponsored By CSO Events
    Elevate Your Protection Strategy at CSO’s Future of Cybersecurity Summit
  • Sponsored By
    Automated, Innovative and Agile: Welcome to the New Workplace
  • Sponsored By Avery Dennison
    How the Digital Edge is Shifting to Item Level: RFID Sensors Transforming Omnichannel Retail

Sponsored Links

  • Software risk is business risk. Learn how to build trust in your software with Synopsys with a click through to
  • Future-proofing your hybrid work strategy isn’t optional. The winners will partner up to reimagine their business, create better experiences, improve productivity, and rethink workspaces. Learn more.
  • With Kolide, you can make your team into your biggest allies for endpoint security. Solve problems, right within Slack. Learn more here.
  • Want to learn how to simplify your IT operations with automation technology that meets your standards.
  • SANS Summer Buy Window: Through July 31 eligible SLTTs can save more than 50% off training.
  • Successful and profitable Edge infrastructure management requires planning. Is your enterprise ready?
  • Networks have never been more complex and cyber threats have never been more advanced. To protect it all, you need to see it all. That's Visibility Without Borders from Netscout.
  • The cyber insurance market is getting tougher as premiums and the bar to get coverage go up
The voice of IT leadership
  • Policies
    • Privacy Policy
    • Cookie Policy
    • Member Preferences
    • About AdChoices
    • Your California Privacy Rights
  • About
    • About Us
    • Advertise
    • Contact Us
    • Foundry Careers
    • Reprints
    • Newsletters
  • More from CIO
    • News

      Reviews

      Buyer's Guides

      Blogs/Opinion

      Podcasts

      Awards programs

  • Digital Magazine
    • View the archive

Copyright © 2022 IDG Communications, Inc.
Top Of Page