• Edition
  • United States
  • Africa
  • ASEAN
  • Australia
  • Canada
  • India
  • Ireland
  • Middle East
  • Netherlands
  • New Zealand
  • United Kingdom
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
Skip to content
  • Menu
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
  • SIGN IN
  • REGISTER

Learn about Insider

Help

Member Preferences

Hot Topics
  • IT Leadership
  • Digital Transformation
  • Innovation
  • Data Analytics & AI
  • Enterprise Applications
  • Diversity and Inclusion

IT Strategy

News

9/11, One Year Later: The Role Technology Plays in Keeping the U.S. Safe

It seems strange writing a column about how 9/11 changed our attitude toward technology. The events of that day obviously …
By Christopher LindquistSep, 1 2002
News

Inside a Security Response Center

A $2,000 check in your mailbox is normally good news. In early May, however, it was definitely bad news for …
By Malcolm WheatleyAug, 1 2002
News

Federal Cyber Crime Service Program Awards Scholarships to Computer Science Students Studying Information Security

Think of this as ROTC for security geeks. The U.S. government has started to award millions of dollars in scholarships …
By Sari KalinJul, 15 2002
News

WASHINGTON WATCH – Doom for the NIPC?

In late March, rumors surfaced that FBI Director Robert Mueller was on the verge of dismantling the National Infrastructure Protection …
By Edited by Janice BrandJun, 15 2002
News

SECURITY – Suckers.com

From the looks of its website, McWhortle Enterprises has all the makings of a terrific investment opportunity. There’s detailed information …
By Daintry DuffyJun, 1 2002
News

Biometrics: Security at Your Fingertips

The Problem CIOs realize that passwords are not enough to insulate their networks from hacks. Passwords suffer from two significant …
By Meridith LevinsonMay, 1 2002
News

Under Development: Facial Recognition

"You look like a girl" may have been the ultimate ’60s-era father-to-son put-down. But while dad may have thought he …
By John EdwardsApr, 15 2002
News

Privacy, Tehnical Issues Surround National ID Card Debate

Getting Carded: The National ID DebateWhat’s not to like about the security a national ID card could provide? Plenty. Congress’s …
By CIO StaffApr, 15 2002
News

Quantum Cryptography: Secure Light Streams

Researchers at Cambridge, England-based Toshiba Research Europe have developed a new type of light-emitting diode (LED) that fires photons in …
By John EdwardsApr, 1 2002
News

Do You Need a Broker?

1. What’s your outsourcing experience?I can write an SLA in Bengali.
By CIO StaffApr, 1 2002
News

Offshore Outsourcing Primer

Why go offshore? Since the mid-’90s, major U.S. companies have been sending significant portions of their application development work offshore?primarily …
By CIO StaffApr, 1 2002
News

Broker Basics

Small startups such as Providio are focused on delivering offshore services to small to midsize enterprises that have little or …
By CIO StaffApr, 1 2002
News

OUTSOURCING – The Man in the Middle

Agents. Intermediaries. "Pivotal providers," one analyst calls them. By any name, third-party brokers are now serious players in the burgeoning …
By Tom FieldApr, 1 2002
News

HOT TOPIC WIRELESS – Secure Your Wireless Network

What’s the easiest way to hack into a company’s unprotected wireless network? Pick up a few cheap pieces of equipment …
By Danielle DunneMar, 15 2002
News

Big Brother Is Watching: Security Will Change Post 9/11

Two traditionally distinct realms of security?the physical world with guards, swipe cards and security cameras, and the virtual world dominated …
By Scott BerinatoFeb, 15 2002
News

Fight Against Cybercrime Goes Global

Fight Against Cybercrime Goes GlobalA new treaty between the United States and more than two dozen other nations will help …
By Edited by Elana VaronFeb, 15 2002
News

SECURITY PLANNING: Living with Terror

Nearly six years before Sept. 11, 2001, Citibank, the Pittsford, N.Y.-based multinational financial services company, became starkly aware how vulnerable …
By Malcolm WheatleyFeb, 15 2002
News

Problem: Security – Solution: Secure Socket Layer Encryption

There are 47 patient treatment rooms in the new emergency department of the Beth Israel Deaconess Medical Center in Boston, …
By CIO StaffFeb, 15 2002
News

Calculating Return on Security Investment

T is the cost of the intrusion detection tool.To determine our return on security investment (ROSI) we simply subtract what …
By Scott BerinatoFeb, 15 2002
News

Response Ability: What To Do During a Computer Security Incident

CIOS ARE OFTEN EXHORTED?by this publication as well as by law enforcement groups?to report network security breaches. Many organizations are …
By Abbie LundbergFeb, 15 2002
News

Cryptologists Continue The Quest for an Unbreakable Code

As mystics search for the lost island of Atlantis and UFO buffs seek out alien spacecraft, cryptologists are continuing their …
By John EdwardsFeb, 1 2002
News

Security Predictions for 2002: Staying Secure

Economic downturn or not, the enterprise security market remains strong?at least for the companies selling security products?according to a recent …
By Christopher LindquistJan, 1 2002
News

Role-Based Access Control Flawed in Actual Use

Long before computers existed, society wrestled with the problem of controlling the right to read or change a document. Two …
By Fred HapgoodDec, 1 2001
News

INFORMATION SECURITY – See You in Court

Just before 8 a.m. on feb. 1, 2001, C.I. Host, a Web-hosting company with 90,000 customers, was hit with a …
By Sarah D. ScaletNov, 1 2001
News

Zone Labs Integrity Combines PC firewall technology with centralized management of security policies and Internet usage

Zone labs maker of the popular ZoneAlarm line of PC firewall products, still plans to help home- and small-office users …
By Christopher LindquistNov, 1 2001
News

IT Security-Associated Terms Defined

Attorneys say the following scenarios are likely to result in lawsuits, which may not be covered by normal business insurance. …
By Sarah D. ScaletNov, 1 2001
News

Without Security There Can Be No Privacy

Without security, there can be no privacy, so the two subjects are forever entwined. Legally, however, the issues are quite …
By Sarah D. ScaletNov, 1 2001
News

SECURITY – Top 10 Headaches for Security Managers

If you’re a security manager and want to reduce your stress levels, start by changing any of the following that …
By CIO StaffOct, 15 2001
News

FBI: Cybercrime Still a Priority

FBI: Cybercrime Still a Priority In the aftermath of the Sept. 11 terrorist attacks on the World Trade Center and …
By Edited by Elana VaronOct, 15 2001
News

Outsourcing: The Grass Really Is Greener Offshore

When sourcing hard-to-fill tech jobs, the best place to look may be beyond your own backyard?way beyond, to Ireland, Russia …
By CIO StaffSep, 15 2001
News

Encryption Technology Ready for Its Close-Up

In the early ’90s the technical culture, usually of one mind on issues of importance developed a crack. Popular technical …
By Fred HapgoodJul, 15 2001
News

Washington D.C. Watch: Eye on Computer Security, IT Policy

Hacks? What Hacks?Sen. Robert Bennett (R-Utah), the Senate’s computer security point man, wants you to start reporting hacks of your …
By Edited by Elana VaronJul, 15 2001
News

Conversation with a Virus Coder

Scalet: What made you choose virus writing instead of some other destructive activity, or instead of some productive activity? What …
By CIO StaffJun, 1 2001
News

Protection Against Cybercrime

Most of us these days know not to open attachments from strangers (at least those of us who work at …
By Abbie LundbergJun, 1 2001
News

Firewalls Fight Threats on Every Front

Most members of the IT community have vivid memories of the security nightmares that got passed around the campfire during …
By Fred HapgoodJun, 1 2001
News

Communication Key to Information Security

Call center. Sales. IT. R&D. Your employees, in every department, are the most important defense in protecting information about your …
By Compiled by Lorraine Cosgrove WareJun, 1 2001
Feature

The Feds' Hit List

Steps you can take to protect yourself and help the authorities if your company suffers an attack.
By T. MayorJun, 1 2001
News

InfraGard Gains Ground

An anonymous government-sponsored program may provide the key to sharing attack-related data.
By T. MayorJun, 1 2001
News

Security Breach Victims: Call the FBI

WE’RE GOING TO CONVINCE YOU that you should call the FBI if your company is ever the victim of a …
By Tracy MayorJun, 1 2001
Feature

CIOs Can Steer Enterprise Investment Strategy

To maintain a competitive advantage, today’s business needs to invest in innovative technologies.
By Ben WorthenMay, 15 2001
News

Schneier on Network Security: It's Not About the Technology

Safety’s price is constant vigilance
By Bruce SchneierMay, 1 2001
News

There's No Such Thing as a Secure Environment

That’s the sad truth about security at many companies. The firewalls, passwords and VPNs may look formidable, but determined bad …
By CIO StaffMar, 1 2001
News

Mudge on Off-the-Shelf Firewalls

Take the dime, one thin dime. What is it? Most people will see it as part of the monetary system. …
By MudgeMar, 1 2001
News

They Want Your Body: Biometrics and Security

Once the stuff found only in James Bond movies, biometrics—identification technologies based on biological features—is rapidly moving into the mainstream …
By John EdwardsFeb, 1 2001
News

Not All E-Signatures Are Equal

There’s been a lot of hype surrounding the new "e-sign" law (officially known as the Electronic Signature in Global and …
By Marcelo HalpernJan, 15 2001
News

Government IT: Cracking Code, Not Kneecaps

The digital age has revolutionized much—including the way children play the age-old game of cops and robbers. The bad guys …
By Lauren CapotostoJan, 1 2001
News

New Law Means Increased Security and Anti-Piracy in Italy

With fake Gucci bags for sale on street corners and pirated software humming in the IS departments of many companies, …
By Philip WillanJan, 1 2001
News

Digital Security in a Networked World

Tell Me No Secrets Secrets and Lies: Digital Security in a Networked World
By Edited by Carol ZarrowNov, 15 2000
News

USS McFaul: High Tech Navy Vessel

By CIO StaffNov, 1 2000
News

Tracking Copyright Infringement in the Arts and Crafts Industry

By Angela GenusaNov, 1 2000
Previous 1 … 50 51 52 53 54 55 56 57 58 59
RESOURCES
  • Modern Solutions That Transform Tax and Finance for Business Growth
  • Enterprise Procurement Playbook
  • Honeywell Case Study
  • Empower Employees with Digital Purchasing Webinar
  • Resilience through Rainstorms – How Unum weathers any storm with VSM
VIEW ALL
BrandPosts Learn More
×

BrandPosts are written and edited by members of our sponsor community. BrandPosts create an opportunity for an individual sponsor to provide insight and commentary from their point-of-view directly to our audience. The editorial team does not participate in the writing or editing of BrandPosts.

  • Sponsored By CSO Events
    Elevate Your Protection Strategy at CSO’s Future of Cybersecurity Summit
  • Sponsored By
    Automated, Innovative and Agile: Welcome to the New Workplace
  • Sponsored By Avery Dennison
    How the Digital Edge is Shifting to Item Level: RFID Sensors Transforming Omnichannel Retail

Sponsored Links

  • SANS Summer Buy Window: Through July 31 eligible SLTTs can save more than 50% off training.
  • The cyber insurance market is getting tougher as premiums and the bar to get coverage go up
  • Future-proofing your hybrid work strategy isn’t optional. The winners will partner up to reimagine their business, create better experiences, improve productivity, and rethink workspaces. Learn more.
  • Software risk is business risk. Learn how to build trust in your software with Synopsys with a click through to
  • Networks have never been more complex and cyber threats have never been more advanced. To protect it all, you need to see it all. That's Visibility Without Borders from Netscout.
  • Successful and profitable Edge infrastructure management requires planning. Is your enterprise ready?
  • Want to learn how to simplify your IT operations with automation technology that meets your standards.
  • With Kolide, you can make your team into your biggest allies for endpoint security. Solve problems, right within Slack. Learn more here.
The voice of IT leadership
  • Policies
    • Privacy Policy
    • Cookie Policy
    • Member Preferences
    • About AdChoices
    • Your California Privacy Rights
  • About
    • About Us
    • Advertise
    • Contact Us
    • Foundry Careers
    • Reprints
    • Newsletters
  • More from CIO
    • News

      Reviews

      Buyer's Guides

      Blogs/Opinion

      Podcasts

      Awards programs

  • Digital Magazine
    • View the archive

Copyright © 2022 IDG Communications, Inc.
Top Of Page