IT Strategy
News
WASHINGTON WATCH – Doom for the NIPC?
In late March, rumors surfaced that FBI Director Robert Mueller was on the verge of dismantling the National Infrastructure Protection …News
SECURITY – Suckers.com
From the looks of its website, McWhortle Enterprises has all the makings of a terrific investment opportunity. There’s detailed information …News
Biometrics: Security at Your Fingertips
The Problem CIOs realize that passwords are not enough to insulate their networks from hacks. Passwords suffer from two significant …News
Under Development: Facial Recognition
"You look like a girl" may have been the ultimate ’60s-era father-to-son put-down. But while dad may have thought he …News
Privacy, Tehnical Issues Surround National ID Card Debate
Getting Carded: The National ID DebateWhat’s not to like about the security a national ID card could provide? Plenty. Congress’s …News
Quantum Cryptography: Secure Light Streams
Researchers at Cambridge, England-based Toshiba Research Europe have developed a new type of light-emitting diode (LED) that fires photons in …News
Offshore Outsourcing Primer
Why go offshore? Since the mid-’90s, major U.S. companies have been sending significant portions of their application development work offshore?primarily …News
Broker Basics
Small startups such as Providio are focused on delivering offshore services to small to midsize enterprises that have little or …News
OUTSOURCING – The Man in the Middle
Agents. Intermediaries. "Pivotal providers," one analyst calls them. By any name, third-party brokers are now serious players in the burgeoning …News
HOT TOPIC WIRELESS – Secure Your Wireless Network
What’s the easiest way to hack into a company’s unprotected wireless network? Pick up a few cheap pieces of equipment …News
Big Brother Is Watching: Security Will Change Post 9/11
Two traditionally distinct realms of security?the physical world with guards, swipe cards and security cameras, and the virtual world dominated …News
Fight Against Cybercrime Goes Global
Fight Against Cybercrime Goes GlobalA new treaty between the United States and more than two dozen other nations will help …News
SECURITY PLANNING: Living with Terror
Nearly six years before Sept. 11, 2001, Citibank, the Pittsford, N.Y.-based multinational financial services company, became starkly aware how vulnerable …News
Problem: Security – Solution: Secure Socket Layer Encryption
There are 47 patient treatment rooms in the new emergency department of the Beth Israel Deaconess Medical Center in Boston, …News
Calculating Return on Security Investment
T is the cost of the intrusion detection tool.To determine our return on security investment (ROSI) we simply subtract what …News
Response Ability: What To Do During a Computer Security Incident
CIOS ARE OFTEN EXHORTED?by this publication as well as by law enforcement groups?to report network security breaches. Many organizations are …News
Cryptologists Continue The Quest for an Unbreakable Code
As mystics search for the lost island of Atlantis and UFO buffs seek out alien spacecraft, cryptologists are continuing their …News
Security Predictions for 2002: Staying Secure
Economic downturn or not, the enterprise security market remains strong?at least for the companies selling security products?according to a recent …News
Role-Based Access Control Flawed in Actual Use
Long before computers existed, society wrestled with the problem of controlling the right to read or change a document. Two …News
INFORMATION SECURITY – See You in Court
Just before 8 a.m. on feb. 1, 2001, C.I. Host, a Web-hosting company with 90,000 customers, was hit with a …News
Zone Labs Integrity Combines PC firewall technology with centralized management of security policies and Internet usage
Zone labs maker of the popular ZoneAlarm line of PC firewall products, still plans to help home- and small-office users …News
IT Security-Associated Terms Defined
Attorneys say the following scenarios are likely to result in lawsuits, which may not be covered by normal business insurance. …News
Without Security There Can Be No Privacy
Without security, there can be no privacy, so the two subjects are forever entwined. Legally, however, the issues are quite …News
SECURITY – Top 10 Headaches for Security Managers
If you’re a security manager and want to reduce your stress levels, start by changing any of the following that …News
FBI: Cybercrime Still a Priority
FBI: Cybercrime Still a Priority In the aftermath of the Sept. 11 terrorist attacks on the World Trade Center and …News
Outsourcing: The Grass Really Is Greener Offshore
When sourcing hard-to-fill tech jobs, the best place to look may be beyond your own backyard?way beyond, to Ireland, Russia …News
Encryption Technology Ready for Its Close-Up
In the early ’90s the technical culture, usually of one mind on issues of importance developed a crack. Popular technical …News
Washington D.C. Watch: Eye on Computer Security, IT Policy
Hacks? What Hacks?Sen. Robert Bennett (R-Utah), the Senate’s computer security point man, wants you to start reporting hacks of your …News
Conversation with a Virus Coder
Scalet: What made you choose virus writing instead of some other destructive activity, or instead of some productive activity? What …News
Protection Against Cybercrime
Most of us these days know not to open attachments from strangers (at least those of us who work at …News
Firewalls Fight Threats on Every Front
Most members of the IT community have vivid memories of the security nightmares that got passed around the campfire during …News
Communication Key to Information Security
Call center. Sales. IT. R&D. Your employees, in every department, are the most important defense in protecting information about your …Feature
The Feds' Hit List
Steps you can take to protect yourself and help the authorities if your company suffers an attack.News
InfraGard Gains Ground
An anonymous government-sponsored program may provide the key to sharing attack-related data.News
Security Breach Victims: Call the FBI
WE’RE GOING TO CONVINCE YOU that you should call the FBI if your company is ever the victim of a …Feature
CIOs Can Steer Enterprise Investment Strategy
To maintain a competitive advantage, today’s business needs to invest in innovative technologies.News
There's No Such Thing as a Secure Environment
That’s the sad truth about security at many companies. The firewalls, passwords and VPNs may look formidable, but determined bad …News
Mudge on Off-the-Shelf Firewalls
Take the dime, one thin dime. What is it? Most people will see it as part of the monetary system. …News
They Want Your Body: Biometrics and Security
Once the stuff found only in James Bond movies, biometrics—identification technologies based on biological features—is rapidly moving into the mainstream …News
Not All E-Signatures Are Equal
There’s been a lot of hype surrounding the new "e-sign" law (officially known as the Electronic Signature in Global and …News
Government IT: Cracking Code, Not Kneecaps
The digital age has revolutionized much—including the way children play the age-old game of cops and robbers. The bad guys …News
New Law Means Increased Security and Anti-Piracy in Italy
With fake Gucci bags for sale on street corners and pirated software humming in the IS departments of many companies, …News
Digital Security in a Networked World
Tell Me No Secrets Secrets and Lies: Digital Security in a Networked World
BrandPosts
Learn More
×
BrandPosts are written and edited by members of our sponsor community. BrandPosts create an opportunity for an individual sponsor to provide insight and commentary from their point-of-view directly to our audience. The editorial team does not participate in the writing or editing of BrandPosts.
-
-
Sponsored By Lenovo
-
Sponsored By Avery Dennison