• January 17, 2008 17 Jan'08

    Q&A with RSA Security's Art Coviello

    This year's RSA Conference will be unlike any other in the past 16 years. RSA Security is now a division of storage and data management giant EMC, thanks to a $2.1 billion acquisition in July, just another indicator of how quickly and dramatically ...

  • January 17, 2008 17 Jan'08

    Disaster preparedness: Staying up while everything else is down

    A 9/11 survivor offers hard-earned advice to those small businesses hit by disasters like Hurricane Katrina.

  • January 17, 2008 17 Jan'08

    Business survival 101: How to perform a business impact analysis

    A business impact analysis can be a manual that helps your company weather disasters. Here are some pointers on how to put one together.

  • January 17, 2008 17 Jan'08

    Disaster recovery, security drive financial firm to Private IP

    A financial firm picked Private IP to connect branch offices, build a disaster recovery site, and secure customer info. Also, the company will have fewer management headaches.

  • January 16, 2008 16 Jan'08

    Visa hopes encouragement improves lagging PCI DSS adoption

    With deadlines looming, Visa is launching an education campaign to address the more than 60% of merchants that fail to meet the PCI Data Security Standards.

  • Sponsored News

    • Why Windows 10? Why Now? A Guide to Migrating Without Hassle

      Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More

    • Top 4 Ways to Strengthen Security with PC Lifecycle Management

      Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More

    • A Simple Guide to Increasing Productivity and Job Satisfaction Across Your Entire Organisation

      Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More

    • Top 6 Ways to Lower TCO Through PC Lifecycle Management

      If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More

    View All Sponsored News
  • January 16, 2008 16 Jan'08

    How Chevron met the PCI DSS deadline

    Layered defenses made PCI DSS compliance easy, but one expert sees a need for improved wireless standards.

  • January 16, 2008 16 Jan'08

    SEC suspends trading of 35 companies over spam

    The Securities and Exchange Commission (SEC) suspended the trading of 35 companies connected to spam email campaigns as part of what it calls "Operation Spamalot."

  • January 16, 2008 16 Jan'08

    SEC document offers clues on TJX security failings

    If company execs need a lesson on what not to do before and after a data breach, experts say there's plenty to learn from a regulatory document TJX filed with the SEC Wednesday.

  • January 16, 2008 16 Jan'08

    HIPAA rules force health insurers to secure sensitive data

    Health insurance companies say HIPAA simply reflects rules they've had to live by all along. That doesn't mean every operation is ironclad.

  • January 16, 2008 16 Jan'08

    Credit union takes top-down approach to compliance

    Regulatory compliance can torture an IT staff, but it doesn't have to. One credit union met compliance regulations by consistently relying on its framework, policies and procedures.

  • January 16, 2008 16 Jan'08

    Updated records retention laws met with skepticism

    Amendments to rules governing electronic discovery are met with criticism by lawyers and compliance officers at a records retention event in NYC.

  • January 16, 2008 16 Jan'08

    Microsoft warns of Excel zero-day flaw

    Attackers are actively exploiting a zero-day flaw in Microsoft's Excel spreadsheet program, and users are being warned not to open files sent from unknown and untrusted sources.

  • January 16, 2008 16 Jan'08

    CPO: An enterprise point-person for privacy

    Many companies are formally creating privacy officers to ensure the confidentiality of data transferred between companies, business partners and customers.

  • January 16, 2008 16 Jan'08

    Sarbanes-Oxley testing cuts could mean cost cuts

    Technology that could help public companies reduce their compliance activities is being embedded in SOX-compliant software. But to work, experts say external auditors must be on board.

  • January 16, 2008 16 Jan'08

    SEC: 404 budgets filled with waste

    The SEC slaps the hand of public accounting firms -- and tells C-level execs to get a better grip on SOX 404 requirements.