• January 17, 2008 17 Jan'08

    Time will narrow gap between physical, IT security

    The convergence of physical and IT security departments within the enterprise may be inevitable, according to some CISOs and analysts, but this union will take time to form.

  • January 17, 2008 17 Jan'08

    Survey: Life back on track at financial firms after SOX

    Once a major pain point for companies, a recent survey shows SOX is now part of everyday life, especially at financial firms.

  • January 17, 2008 17 Jan'08

    Experts: Security no excuse for avoiding mobile devices

    Enterprises shy away from mobile devices for fear of losing sensitive data, but experts say those fears are unwarranted.

  • January 17, 2008 17 Jan'08

    Cooperating with law enforcement for U.S. security

    We need to collaborate on suspected information. ISPs have a responsibility to the users, as such, they should cooperate with law enforcement to continue to monitor the security of U.S. perimeters.

  • January 17, 2008 17 Jan'08

    Employee error fuels data security breaches, survey finds

    Companies are shifting their priorities to focus on internal threats by addressing identity and access management and employee training.

  • Sponsored News

    • Why Windows 10? Why Now? A Guide to Migrating Without Hassle

      Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More

    • Top 4 Ways to Strengthen Security with PC Lifecycle Management

      Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More

    • A Simple Guide to Increasing Productivity and Job Satisfaction Across Your Entire Organisation

      Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More

    • Top 6 Ways to Lower TCO Through PC Lifecycle Management

      If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More

    View All Sponsored News
  • January 17, 2008 17 Jan'08

    Encryption may help regulatory compliance

    A Walt Disney security executive says encrypted file systems hold the answers for enterprises looking to comply with government regulations without sacrificing system performance.

  • January 17, 2008 17 Jan'08

    Gartner analysts to IT pros: Learn the language of risk

    Gartner IT Security Summit: Corporate execs often miss the importance of risk assessments because their IT officers dump too much tech jargon on them, analysts say.

  • January 17, 2008 17 Jan'08

    Privacy breaches: How to avoid making headlines

    Wave of privacy breaches demands integrated approach to physical and IT security. What can your organization do to avoid being the next headline?

  • January 17, 2008 17 Jan'08

    Flurry of state disclosure laws creates confusion for CISOs

    Now that nearly three dozen states have enacted breach disclosure laws, national companies face the challenge of reconciling a vast array of guidelines and their implications.

  • January 17, 2008 17 Jan'08

    FFIEC, HSPD-12 fuel growth in authentication market

    Enterprises aren't the only ones who have had to deal with regulations like FFIEC and HSPD-12. The vendor community has adjusted by offering cost-effective and unobtrusive authentication products, primarily focused on financial institutions.

  • January 17, 2008 17 Jan'08

    SOA, Web services security hinge on XML gateways

    XML security gateways could be the missing piece in most SOA deployments, says Tim Bond, a senior security engineer at webMethods Inc.

  • January 17, 2008 17 Jan'08

    From IT geek to security rock star

    Those who recognize change, bond with colleagues outside IT and factor physical security into their daily routine can go from IT geek to security rock star, experts say.

  • January 17, 2008 17 Jan'08

    SSL VPN use is all about security

    A recent Infonetics poll of 250 companies found that security, not cost or easier user access, is still the biggest driver for deploying SSL VPNs.

  • January 17, 2008 17 Jan'08

    Banks scramble to boost online security

    Many banks will fail to meet a mandate to lock-down certain high-risk transactions over the Internet. But the largest banks are launching new security measures resulting in a surge of sales of identity and access management compliance products.

  • January 17, 2008 17 Jan'08

    Getting compliance on the GRID

    The Object Management Group is attempting to build a database that may one day serve as a clearinghouse for all the world's IT-related regulations. Some say it's impossible, but others say it's badly needed to keep companies secure and out of the ...