News

News

  • January 17, 2008 17 Jan'08

    Verizon security chief says protect your data first

    ATLANTA -- JP Callahan, a former counter-intelligence agent with the U.S. Department of Defense, runs data center security for Verizon Business, the company's data center hosting arm. While Callahan has the demeanor of a standup comedian rather ...

  • January 17, 2008 17 Jan'08

    SAML ratification enables vendor interoperability

    Ratification of the Security Assertion Markup Language (SAML) opens the door for vendors to begin developing and shipping products that support the specification.

  • January 17, 2008 17 Jan'08

    Most malware at home on U.S. servers

    A new report from Finjan says more malware is hosted on local servers in the U.S. and Britain than in countries with less developed e-crime law enforcement policies.

  • January 17, 2008 17 Jan'08

    Federated ID: Still not ready for prime time

    At the Burton Group Catalyst Conference, analysts will outline obstacles that keep federation technology from going mainstream, despite its potential to solve big business security problems.

  • January 17, 2008 17 Jan'08

    TD Ameritrade database hacked, customer data stolen

    Hackers stole data including customer names, addresses and phone numbers from the online broker's database.

  • Sponsored News

    • Why Windows 10? Why Now? A Guide to Migrating Without Hassle

      Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More

    • Top 4 Ways to Strengthen Security with PC Lifecycle Management

      Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More

    • A Simple Guide to Increasing Productivity and Job Satisfaction Across Your Entire Organisation

      Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More

    • Top 6 Ways to Lower TCO Through PC Lifecycle Management

      If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More

    View All Sponsored News
  • January 17, 2008 17 Jan'08

    Expert: Lengthy logs not always a good thing

    Regulatory compliance experts often stress the importance of detailed log keeping. But one legal expert warns too much detail can be used to stifle free speech.

  • January 17, 2008 17 Jan'08

    Opinion: Government misses its chance to protect data

    The unending stream of corporate and government data breaches shows no signs of slowing, and News Director Dennis Fisher writes that lawmakers and government officals are missing their chance to fill the breach.

  • January 17, 2008 17 Jan'08

    Data breach law could put financial burden on retailers

    Legislation being considered in Massachusetts would shift the financial burden associated with a data breach onto retailers. It would be the first of its kind in the United States.

  • January 17, 2008 17 Jan'08

    Governor rejects data security law

    California Gov. Arnold Schwarzenegger rejected a bill that would have placed more liability on businesses in that state to protect credit card data.

  • January 17, 2008 17 Jan'08

    The cost of privacy safeguards

    What are companies spending to comply with the privacy and data protection regulations imposed by HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley and the California Security Breach Notification Act?

  • January 17, 2008 17 Jan'08

    Analyst warns to keep tech talk out of security policies

    It's easy to get carried away when developing or revamping a corporate security policy, but one expert at Information Security Decisions says it's actually much better to keep things short and simple.

  • January 17, 2008 17 Jan'08

    Operational risk another facet of compliance

    Fortune 500 summit examines operational risk management as a key challenge for financial institutions.

  • January 17, 2008 17 Jan'08

    Reporter's Notebook: Why failing an audit can lead to success

    At Information Security Decisions, attendees discuss cash-strapped compliance efforts, the premature demise of IDS, job security courtesy of Microsoft and more.

  • January 17, 2008 17 Jan'08

    Audit your organization year-round for best results, experts say

    Compliance officers can save themselves a lot of grief by following a schedule that mirrors the National Football League, a CISO at the Burton Group Catalyst Conference said.

  • January 17, 2008 17 Jan'08

    VoIP: Is anyone responsible for security?

    A panel of experts discuss the drawbacks of VoIP and who, ultimately, is in charge of its security.

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

ComputerWeekly.com

Close