• Edition
  • United States
  • Africa
  • ASEAN
  • Australia
  • Canada
  • India
  • Ireland
  • Middle East
  • Netherlands
  • New Zealand
  • United Kingdom
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
Skip to content
  • Menu
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
  • SIGN IN
  • REGISTER

Learn about Insider

Help

Member Preferences

Hot Topics
  • IT Leadership
  • Digital Transformation
  • Innovation
  • Data Analytics & AI
  • Enterprise Applications
  • Diversity and Inclusion

IT Strategy

News

Security Flaw Discovered in IE7 Beta 2

A story on eWeek.com yesterday reported that an independent security researcher by the name of Tom Ferris had …
By CIO StaffFeb, 2 2006
Feature

Strategic Partnerships and the Mid-Market CIO

For mid-market CIOs, setting up and managing a strategic partnership has its own challenges.
By Stephanie OverbyFeb, 1 2006
News

Is Online Banking Getting Stronger?

Last October, an obscure government body called the Federal Financial Institutions Examination Council (FFIEC) issued a security guideline that banks …
By Scott BerinatoFeb, 1 2006
News

Security at the 2006 Winter Olympics

Champions on the snow and ice aren’t the only ones who have been training intensely for the Olympic Winter Games …
By Susannah PattonFeb, 1 2006
News

State CIOs Need More IT Security Support from DHS

The U.S. Department of Homeland Security (DHS) must improve its support for U.S. state and local governments so they can …
By CIO StaffJan, 26 2006
News

20th Anniversary of the 1st Computer Virus: Let Us Now Praise Famous Viruses

by Constantine von HoffmanThis month marks the 20th anniversary of the release of the first computer virus! HOORAY and …
By CIO StaffJan, 20 2006
News

Two New WMF Bugs Found

Just days after Microsoft patched a critical vulnerability in the way the Windows operating system renders certain types of graphics …
By CIO StaffJan, 10 2006
News

The Week's Top 10 IT News Stories: Security Flaws of Many Kinds

1. Microsoft Rushes Out Patch for WMF Flaw, Network World, 1/5. Not the best week for Redmond on …
By CIO StaffJan, 6 2006
News

16 Facts About the Windows Metafile (WMF) Vulnerability

Computerworld has put together a neat package of answers to 16 questions about the recently disclosed Windows Metafile …
By CIO StaffJan, 5 2006
News

Microsoft: Virus Patch Coming

On Wednesday, Microsoft announced its hopes to have a patch that will fix the most recent flaw discovered in the …
By CIO StaffJan, 4 2006
News

Security Holes Found in BlackBerrys

The maker of BlackBerrys warned yesterday that the popular wireless devices are vulnerable to two types of attacks that could …
By CIO StaffJan, 4 2006
News

Will E-Votes Be Counted?

2006 Election – Questions about the security and accuracy of electronic voting systems are likely to persist through the national …
By Grant GrossJan, 1 2006
News

Marriott Confesses Backup Tape Loss

 Marriott International joined the ever-growing list of major corporations that have reported significant losses or thefts of personal data. Marriott …
By CIO StaffDec, 28 2005
News

China Slams Spam

According to AP on Yahoo News, in 2006, Chinese citizens will have to register their cell phone accounts …
By CIO StaffDec, 28 2005
News

County Rife with Identity Theft Reconsiders Online Records

In 1997, Arizona’s Maricopa County (which includes Phoenix) became the first government entity in the nation to post public records …
By CIO StaffDec, 22 2005
News

FTC: Spam Declining; Anti-Spam Vendors: Don't Be So Sure…

Viagra.  Online Mortgages.  PayPal account updates and eBay security notices.  Such subject lines grace e-mail inboxes across the word every …
By CIO StaffDec, 22 2005
News

What's Up at the NSA?

The President and members of Congress have begun to speak publicly about the NSA domestic spying program the New York …
By CIO StaffDec, 20 2005
News

It's The Science, Stupid. It's Not The Intellectual Property.

According to the New York Times, four leading technology companies and seven American universities have agreed on principles …
By CIO StaffDec, 19 2005
News

Senate Rejects Patriot Act Extension

According to the Associated Press on YahooNews, The Senate refused early today to …
By CIO StaffDec, 16 2005
News

AT&T Launches Internet Security Channel

According to Reuters, AT&T today launches a news channel that focuses on Internet security issues for its business …
By CIO StaffDec, 14 2005
News

Microsoft Releases Security Upgrade for IE

Microsoft has released a security upgrade that fixes newly discovered vulnerabilities in its Internet Explorer browser, including one critical flaw …
By CIO StaffDec, 14 2005
News

Sam's Club Security Breach

Sam’s Club, a division of Wal-Mart Stores, is investigating a security breach that has exposed credit card data belonging to …
By CIO StaffDec, 13 2005
News

USA Patriot Act Extended

House and Senate negotiators reached an agreement Thursday to extend the USA Patriot Act before it expires Dec. …
By CIO StaffDec, 8 2005
News

NY Breach Notification Law Goes into Effect

New York has joined the growing list of U.S. states requiring that companies notify their customers whenever private information has …
By CIO StaffDec, 8 2005
News

Top 10 IT News Stories of the Week: Norton Feels Insecure at the Top

 1. "Norton Gets A Bit Less Secure,"  BusinessWeek, 12/1. Being market leader can be a tough position to …
By CIO StaffDec, 2 2005
News

How to Foil a Wiretap

New security flaw revealed
By CIO StaffNov, 30 2005
News

Microsoft Offers Security for Free (For Now)

Microsoft today will make its Windows OneCare Live "computer-health" service available free in a test, as reported in today’s
By CIO StaffNov, 30 2005
News

Fear Haunts Online Shopping

Despite the increasing size of the online shopping market, one in four U.S. consumers won’t shop online during the upcoming …
By CIO StaffNov, 23 2005
News

Major Risk Found in Flash

Macromedia has warned of a critical bug in its Flash Player — one of the most widely used pieces of …
By CIO StaffNov, 8 2005
News

Security Algorithms Raise Concerns

Industry experts agree that the future of two widely used security algorithms is fated, but with no clear alternatives in …
By CIO StaffNov, 7 2005
News

Consumers Won't Stand For Data Breaches

Financial sector CIOs take note — institutions such as banks and credit unions face serious repercussions should they suffer a …
By CIO StaffNov, 3 2005
News

Study Says Outsourcing Creates Jobs Here

Offshore outsourcing helps the U.S. economy by lowering production costs for IT vendors and product costs for their customers and …
By CIO StaffNov, 3 2005
News

Clicking, Clacking and Snooping: software can analyze the sounds of someone typing

The idea of snooping on keyboards has been around since the Cold War, when Soviet spies bugged typewriters in the …
By Robert McMillanNov, 1 2005
News

Seeing No Evil: Is It Time To Regulate the ISP Industry?

In a mock courthouse earlier this year, the smack of a gavel opened a case for the ages. Behind one …
By Matt VillanoNov, 1 2005
News

Visa and MasterCard Offer Security Test Kits

Visa and MasterCard have launched free, self-assessment tools for merchants and providers to test and validate the security of their …
By CIO StaffOct, 25 2005
News

Ericsson Sets Up R&D and Service Center In India

Telefonaktiebolaget LM Ericsson announced Monday that it is setting upa research and development center and a regional services deliverycenter in …
By CIO StaffOct, 24 2005
News

Amazon Moves More Development to India

Amazon.com Inc. will open a second development center in India, to be located in the southern Indian city of Chennai, …
By CIO StaffOct, 24 2005
News

Inspection of DOT IT Finds 3,000 Weaknesses

During a recent audit of the U.S. Department of Transportation’s IT systems, the agency’s inspector general was able to take …
By CIO StaffOct, 20 2005
News

Prediction: 8 Million Outsourced Jobs

Utility services and modular, or "component," offerings are trends that are emerging as the outsourcing industry reaches a new level …
By CIO StaffOct, 20 2005
News

Cisco Will Spend $1 Billion in India

Cisco Systems Inc. announced Wednesday that it will invest US$1.1 billion in India over the next three years. Cisco President …
By CIO StaffOct, 20 2005
News

Fed Advisers Say Online Banking Lacks Security

A multi-agency U.S. federal advisory body with broad regulatory powers over banks Tuesday issued new guidelines aimed at improving security …
By CIO StaffOct, 19 2005
News

Fed to Banks: Strengthen Web Log-Ons

According to AP, on Yahoo News, federal regulators will require banks to strengthen security for Internet customers. Bank …
By CIO StaffOct, 18 2005
News

India Says Google Maps Aid Terrorists

The easy availability online of detailed maps of countries from services such as Google Earth can be misused by terrorists, …
By CIO StaffOct, 18 2005
News

Cisco Talks about Black Hat Fiasco

At the Black Hat USA conference in July, Cisco Systems Inc. and Atlanta-based Internet Security Systems Inc. tried to stop …
By CIO StaffOct, 17 2005
News

Phishing Sinks Confidence in E-Commerce

Consumer confidence in the security of their online transactions is slipping due to the growth of phishing-related fraud and identity …
By Lorraine Cosgrove WareOct, 15 2005
News

10 common security ailments and 10 practical remedies

This has not been a banner year for information security.From a stolen laptop full of Social Security numbers to a …
By Thomas WailgumOct, 15 2005
News

New Locks, New Keys: Examine How You Authenticate Users

No doubt all the breaches of customer data this year have forced you to defend your security strategy. And no …
By Galen GrumanOct, 15 2005
News

Asian IT Security Stuck in Fire-Fighting Mode

 While security is moving up the priority ladder of businesses, organizations are still looking at security on a piecemeal basis. …
By CIO StaffOct, 13 2005
News

Google Fixes Flaw Quickly and Quietly

Google Inc. fixed a security vulnerability on its search-engine Web site within days of being notified by security vendor Finjan …
By CIO StaffOct, 11 2005
News

Symantec AntiVirus Scan Carries Critical Bug

Users of the Symantec Corp.’s AntiVirus Scan Engine are being advised to upgrade their software, thanks to a critical security …
By CIO StaffOct, 7 2005
Previous 1 … 50 51 52 53 54 55 56 57 58 59 60 Next
RESOURCES
  • Palo Alto Networks
    Go Beyond Remote-Access VPN
  • Palo Alto Networks
    Forrester TEI Spotlight: Prisma Access
  • Intelsat
    Meeting Short-Term Cellular Demand with Satellite Service
  • Intelsat
    Helping Communities Recover from Disaster with Always-Ready, Satellite-Based Cellular Backhaul
  • Palo Alto Networks
    Top 10 Considerations for Your Next-Gen SD-WAN
VIEW ALL
BrandPosts Learn More
×

BrandPosts are written and edited by members of our sponsor community. BrandPosts create an opportunity for an individual sponsor to provide insight and commentary from their point-of-view directly to our audience. The editorial team does not participate in the writing or editing of BrandPosts.

  • Sponsored By CSO Events
    Elevate Your Protection Strategy at CSO’s Future of Cybersecurity Summit
  • Sponsored By
    Automated, Innovative and Agile: Welcome to the New Workplace
  • Sponsored By Avery Dennison
    How the Digital Edge is Shifting to Item Level: RFID Sensors Transforming Omnichannel Retail

Sponsored Links

  • SANS Summer Buy Window: Through July 31 eligible SLTTs can save more than 50% off training.
  • Software risk is business risk. Learn how to build trust in your software with Synopsys with a click through to
  • The cyber insurance market is getting tougher as premiums and the bar to get coverage go up
  • The Edge is the future—uncover the components of Edge success today and achieve your goal in becoming a modern, digital-first, and data-driven enterprise.
  • Future-proofing your hybrid work strategy isn’t optional. The winners will partner up to reimagine their business, create better experiences, improve productivity, and rethink workspaces. Learn more.
  • With Kolide, you can make your team into your biggest allies for endpoint security. Solve problems, right within Slack. Learn more here.
  • Networks have never been more complex and cyber threats have never been more advanced. To protect it all, you need to see it all. That's Visibility Without Borders from Netscout.
  • Want to learn how to simplify your IT operations with automation technology that meets your standards.
  • Never worry again when disaster might strike with Carbonite Recover®
The voice of IT leadership
  • Policies
    • Privacy Policy
    • Cookie Policy
    • Member Preferences
    • About AdChoices
    • Your California Privacy Rights
  • About
    • About Us
    • Advertise
    • Contact Us
    • Foundry Careers
    • Reprints
    • Newsletters
  • More from CIO
    • News

      Reviews

      Buyer's Guides

      Blogs/Opinion

      Podcasts

      Awards programs

  • Digital Magazine
    • View the archive

Copyright © 2022 IDG Communications, Inc.
Top Of Page