Latest (all topics)
Top stories
Hardware
All-in-One printer
Apple Mac
Audio
Backup
Book
Broadband
Camcorder
CD drive
Desktop PC
Digital camera
DVD drive
Gaming
Graphics card
Hard disk
Input device
Laptop
LCD
Mobile phone
Modem
Monitor
Motherboard
Multimedia
Networking
PDA
Printer
Processor
Projector
Scanner
Server
Tuning
UPS
Video
Web camera
Whiteboard
Miscellaneous
Software
Apple Mac
Audio
Backup
Business
Developer
Educational
Game
Graphics
Internet
Linux
Networking
Operating System
PDA
Security
Server
Utilities
Miscellaneous
 
 

1 2 3 4 5 ... »

Defending In Depth
Organisations are under attack. Not from competitors, federal regulations or consumer outrage, although those are concerns. But enterprises - and subsequently their client base - have become marked targets. To leverage ...
 
30.03.07
 
Cyber Security & Other Games
Cyber security has proved to be an elusive goal that now requires a radical shift in the mental models of IT practitioners. The first issue stems from the idealised concept of security with the implicit belief that a system ...
 
27.03.07
 
Second Life, Second Identity?
Information is precious and personal information is perhaps the most valuable information we have. Companies and organisations which collect consumer and customer data use this information to analyse and measure specific ...
 
20.03.07
 
Don't Choke In The Name Of Security
News reports about network security breaches have become commonplace. Accompanying these reports is usually a staggering price tag for network downtime, lost productivity, lost revenue, and loss of customer trust. Each time ...
 
14.03.07
 
A Baker's Dozen Of Security Bytes
The lifespan of laptops, PDAs and smartphones is falling as the pace of technology marches ever onwards. But for every new mobile device purchased by organisations of all sizes there is usually a piece of legacy hardware that ...
 
12.03.07
 
Patching Up Security
CEOs and CFOs know that viruses can damage their business and cost millions. But many do not realise that an anti-virus programme cannot help when it comes to the increasingly frequent flaws that are being exposed in corporate ...
 
08.03.07
 
How Cybercrime Operations Work
Hackers are no longer motivated by notoriety - it’s now all about the money. Cybercrime has become a profession; a business model - and the demographic of your typical mastermind cybercriminal is changing rapidly from lone ...
 
27.02.07
 
Stop Wasting Money On Penetration Testing
Penetration Testing is the final word in proving that technical compliance and good security pratices are in place - or so it should be. But how do you know if you’re getting a good service or not? What if the consultant ...
 
22.02.07
 
HP Spying Case Highlights Data Conundrum
The well-publicised HP spying scandal has again brought into sharp focus the value which companies place on confidential company data and intellectual property. In an attempt to discover how board level information was ...
 
21.02.07
 
Password Malpractice, Are You Guilty?
The explosion of passwords in today’s enterprise has created a sea of holes in the security infrastructure. Some CIOs have responded to the challenge by bringing in the lifeboats, figuratively speaking, but in many cases the ...
 
16.02.07
 
Has IT Driven You Crazy?
It has long been maintained that you have to be crazy to work in the IT business, and now it’s official. A recent study by the U.S. Secret Service, who must be considered eminently qualified to recognise the symptoms, and ...
 
07.02.07
 
People Cannot Be Patched
Around 20 years ago managers working in the food and car industries got together in order to implement comprehensive quality management. Under the slogan ‘Total Quality’ supply chains and production processes began to be ...
 
23.01.07
 
Creating A Culture Of Security
Why is business still plagued by poor data security? Why do we constantly read stories about security breaches, data theft and customer lawsuits stemming from confidential information getting lost or falling into the wrong ...
 
18.01.07
 
Malware Shift Creates New Challenges
Over the past few years those monitoring trends on malicious Internet activities have noticed a significant change. We are seeing a sizeable decrease in the media grabbing pandemic outbreaks of malicious software. Yet with ...
 
16.01.07
 
Porn Affects Your Pupils!
A recent audit undertaken by my company in a high school uncovered inappropriate images on every PC scanned, which is nearly five times the average figure found in corporations and the number of illicit images found per megabyte ...
 
12.01.07
 
   
     
© 2007 Black Letter Publishing Ltd. - Disclaimer - Terms - About - Contact - Advertise - Newsletter

Hosted By Gradwell - Powered By Eclipse Internet - Sponsored By Ipswitch & Microboards DVD Duplicators