• January 17, 2008 17 Jan'08

    VoIP: Is anyone responsible for security?

    A panel of experts discuss the drawbacks of VoIP and who, ultimately, is in charge of its security.

  • January 17, 2008 17 Jan'08

    Virus onslaught sickens smartphones

    Mobile viruses are still somewhat of an unknown, but their numbers have already reached the hundreds. Despite their rapid growth, experts say the severity of a mobile virus depends on how vicious it is and how fast it can spread.

  • January 17, 2008 17 Jan'08

    BlackBerry flaw highlights growing mobile device risks

    Mobile security issues have been making waves, and following a recently revealed BlackBerry vulnerability, it's time to take notice.

  • January 17, 2008 17 Jan'08

    Who, or what, is reading your email?

    According to a new survey, fear of data leaks has caused many large companies to hire staff specifically to read and analyze outbound employee email.

  • January 17, 2008 17 Jan'08

    When relationships end, so does security

    It is often said that the trusted user is any enterprise's greatest security threat. However, what defenses exist for the threat posed by the people who trusted users trust – girlfriends, boyfriends, spouses and significant others? As Edmund X...

  • Sponsored News

    • Why Windows 10? Why Now? A Guide to Migrating Without Hassle

      Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More

    • Top 4 Ways to Strengthen Security with PC Lifecycle Management

      Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More

    • A Simple Guide to Increasing Productivity and Job Satisfaction Across Your Entire Organisation

      Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More

    • Top 6 Ways to Lower TCO Through PC Lifecycle Management

      If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More

    View All Sponsored News
  • January 17, 2008 17 Jan'08

    Messaging techniques spawn new security policies

    Gartner IT Security Summit: As people use a growing variety of messaging programs in the workplace, companies are being forced to create new policies to minimize crossover threats.

  • January 17, 2008 17 Jan'08

    WebEx addresses ActiveX flaw

    The Web conferencing leader has patched an ActiveX flaw that could have enabled an attacker to gain access to sensitive data.

  • January 17, 2008 17 Jan'08

    Customer vs. Bank of America: Who's to blame?

    Who will win a landmark case on customer data protection?

  • January 17, 2008 17 Jan'08

    Spam, phishing, IM attacks rise

    Malicious attacks using social engineering techniques are on the rise. While botnets may finally be forcing ISPs into the battle, enterprise security pros are working overtime on strategies to keep the threats at bay.

  • January 17, 2008 17 Jan'08

    Finjan: Attackers wild about widgets

    In a new report, security firm Finjan says the digital underground will have no trouble finding flaws to exploit in the widgets most Web users take for granted.

  • January 17, 2008 17 Jan'08

    Black Hat 2007: For financial firms, availability too often trumps security

    Researchers say startling weaknesses in key protocols such as FIX and an addiction to availability have left the financial services industry in need of a security wake-up call.

  • January 17, 2008 17 Jan'08

    Discarded hard drives can be dangerous

    A treasure trove of sensitive information can end up in the wrong hands if old hard drives aren't properly disposed of, one security expert warns.

  • January 17, 2008 17 Jan'08

    Banks prepare lawsuit over TJX data breach

    TJX will face a lawsuit from three New England banking associations as well as individual banks. The Massachusetts Bankers Association is inviting others to join the suit.

  • January 17, 2008 17 Jan'08

    Survey: Companies disregard data security breach risks

    Companies continue to lack a response plan and fail to implement appropriate encryption technologies, according to a survey of more than 700 IT executives and security officers.

  • January 17, 2008 17 Jan'08

    Data leakage problem tough to solve

    Companies are searching for ways to prevent sensitive information from slipping out of their networks, but various technologies to address the problem have their drawbacks.