News

News

  • March 03, 2008 03 Mar'08

    Banks, telephone companies top identity theft study

    Research conducted at the University of California, Berkeley highlights which companies are targeted most by identity thieves.

  • February 22, 2008 22 Feb'08

    Cryptography's future

    Dr. Burt Kaliski is chair of the office of the CTO and vice president of research at RSA Security, the security division of EMC. He is also chief scientist of its research center, RSA Laboratories. He joined RSA Data Security in 1989 and helped ...

  • February 14, 2008 14 Feb'08

    Phishers targeting smaller financial firms, credit unions

    Financial institutions remain a target of phishing attacks, but it's no longer just the biggest firms that are under assault. Fortunately, companies are finding ways to fight back.

  • February 13, 2008 13 Feb'08

    How to survive a data breach

    When Colin Crook offers advice on how companies should deal a security breach, he speaks from experience. He was CTO of Citicorp [now Citigroup, parent company of Citibank] over 10 years ago when a hacker penetrated the company's network....

  • February 12, 2008 12 Feb'08

    New remote access system cuts costs

    When it comes to application management, IT managers often face a balancing act between security and cost. In this case study, one financial services firm explains why it replaced its Citrix presentation server with Ericom.

  • Sponsored News

    • Why Windows 10? Why Now? A Guide to Migrating Without Hassle

      Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More

    • Top 4 Ways to Strengthen Security with PC Lifecycle Management

      Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More

    • A Simple Guide to Increasing Productivity and Job Satisfaction Across Your Entire Organisation

      Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More

    • Top 6 Ways to Lower TCO Through PC Lifecycle Management

      If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More

    View All Sponsored News
  • February 04, 2008 04 Feb'08

    Survey discovers access control problems at many firms

    Despite growing data breach dangers as a result of trusted insiders, many firms are failing to implement a strong access governance program, according to a recent survey.

  • January 18, 2008 18 Jan'08

    Missing backup tape prompts identity theft fears for JC Penney customers

    The personal information of about 650,000 customers was put at risk after a backup tape, stored at a warehouse run by Iron Mountain Inc., disappeared.

  • January 18, 2008 18 Jan'08

    GLBA's focus on data security has helped financial services, say industry observers

    While few financial services organizations enjoy the work that comes with ensuring its security measures are compliant with the Gramm-Leach-Bliley Act, experts and industry observers say there's no question that GLBA has helped foster stronger ...

  • January 18, 2008 18 Jan'08

    HIPAA: Clean bill of health, or dying a slow death?

    HIPAA has changed the way a lot of healthcare companies handle data, but the fact that no one has been fined or jailed for non-compliance makes one wonder if they'll keep up with it.

  • January 17, 2008 17 Jan'08

    RSA 2006: A one-size-fits-all approach to compliance?

    IT security professionals are looking for a better blueprint to meet the common demands of multiple regulations. But does such a blueprint really exist?

  • January 17, 2008 17 Jan'08

    IT pros impede PCI, Sarbanes Oxley compliance

    The biggest barrier to collaboration between IT and compliance professionals is the lack of understanding about risk and compliance issues by corporate IT, according to a survey.

  • January 17, 2008 17 Jan'08

    Feds 'banking' on financial industry to tell us we're for real

    U.S. regulators are demanding banks and other phish-friendly industries increase their online security within the next year. As usual, recommendations are loosely written and vendors are capitalizing on all the options.

  • January 17, 2008 17 Jan'08

    Banking on security checks and balances

    Financial firms like Clarke American face danger from every corner of cyberspace and sometimes from within. The company's CISO explains how he's using a combination of defenses and strategies to keep threats at bay.

  • January 17, 2008 17 Jan'08

    Analyst: Stopping spam is for the security admin

    SAN FRANCISCO -- Is spam a security administrator's problem? It is, according to Gartner Inc. Enterprise Messaging Research Director Maurene Grey. Grey recently gave a talk on spam filtering at a Sprint user event. Among the things she discussed ...

  • January 17, 2008 17 Jan'08

    All I want for Christmas are some laws with teeth

    From a state breach-notification law spreading nationwide to a spam king that legal eagles finally nailed, 2005 marked a turning point in data security. But we've got suggestions on how to do more.

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

ComputerWeekly.com

Close