Printer Friendly

Browse Information technology topic

Safety and security measures subtopic

Articles

1-132 out of 132 article(s)
Title Author Type Date Words
Businesses Opening up to Security Risks by Failing to Gain Grasp of DevSecOps: Claranet. Mar 1, 2019 635
CenturyLink, Inc.--Mid-sized businesses want security embedded in the network--18/10/2018. Oct 23, 2018 377
How to Navigate the Intersection of DevOps and Security. Rao, Meera Jul 1, 2018 1180
ManageEngine cements endpoint security. Feb 15, 2018 257
Data delivers IT insights for Dubai Municipality. Jan 2, 2018 1121
INTEGRATING INTERNAL CONTROL FRAMEWORKS FOR EFFECTIVE CORPORATE INFORMATION TECHNOLOGY GOVERNANCE. Ettish, Abdou Ahmed; El-Gazzar, Samir M.; Jacob, Rudolph A. Report Sep 1, 2017 4425
Gartner: Many organizations falsely equate IT security spending with maturity. Dec 9, 2016 684
Many companies careless in securing data on cloud: Gemalto Report. Jul 28, 2016 641
IT risks that health care firms can overlook: network safeguards that can put into place to prevent illegal access to confidential information. Devogt, Chad Apr 1, 2016 736
The why and how of IT risk management. Schafer, Steven L. Apr 1, 2016 3741
ICTS AGAINST SECURITY. Minhas, Badar Sultan Mar 1, 2015 783
Firewall under fire: could a cybercrime send you up in flames? Hunt, Kristin Gunderson Jan 1, 2013 1873
Security awareness--once is never enough: Cryptzone UK Ltd. Dec 1, 2012 710
Cyprus : An agreement was signed between Cyprus and Estonia on the Mutual Protection of Classified Information. Nov 29, 2012 432
Security as an enabler of innovation. Dimitriadis, Christos K. Nov 1, 2012 1081
Could you bring your company to its knees? Nov 1, 2012 1166
Transnational crimes and information technologies. Ekmekcioglu, Ercan Report Jun 1, 2012 2182
Businesses respond to volatile markets by focusing on increasing IT agility, says Ernst & Young and CIO KLUB survey. Apr 24, 2012 1162
IRAN, ISLAMIC REPUBLIC OF : Head - Essentially the internet is an unsafe network ! Brief article Mar 7, 2012 120
Are you practicing secure collaboration or is it chaotic? Varonis looks at the implications for organisations that get it wrong and gives advice on how to protect your information in a digital world. Faitelson, Yaki Oct 1, 2011 1035
Avoid becoming the next big IT security disaster. MacLeod, Calum Aug 1, 2011 1246
Enterprise Data Risk Prevention for IT Management. Sep 20, 2010 567
New HP Report Arms IT Management for Data Risk Prevention. Sep 20, 2010 567
Exploring the influence of national cultures on non-compliance behavior. Dols, Taco; Silvius, A.J. Gilbert Report Aug 1, 2010 7740
Infosecurity Europe 2010. Bentley, Alan Jul 1, 2010 1924
Tech savvy: understanding it risks: with tech threats on the rise, ignorance about IT security is no longer an option. What you don't know can spell disaster. Chavez, David Jun 1, 2010 1894
User errors will lead to data leakage -- worldwide survey on IT security. Survey Oct 21, 2009 680
Be careful when outsourcing IT operations. Jun 25, 2009 511
'Next-Generation IT Security Is Need Of The Hour'. Conference notes Feb 17, 2009 782
System of system failures: meta methodology for IT engineering safety. Nakamura, Takafumi; Kijima, Kyoich Report Jan 1, 2009 7828
Willing the way. Kaser, Dick Oct 1, 2008 661
Crooks zero in on vulnerable data. Wagley, John Aug 1, 2007 440
The heavy burden of IT infrastructure upgrades. Brief article Jul 1, 2007 288
Corporate concern about network security. Brief article Mar 1, 2006 182
Password overload--a risky business. Mar 1, 2006 306
The wide angle. Oct 10, 2005 1237
The car in front is more secure. Aug 10, 2005 601
Perimeterless security in action. Aug 10, 2005 1041
Passing the security test. Aug 10, 2005 472
The right risk? Aug 10, 2005 560
Preventing the compromise of classified data on DON IT systems and networks. Korenblatt, Jennifer Jul 1, 2005 1586
Security: Risk and reward. Jun 10, 2005 468
The audit trial. Jun 10, 2005 836
Worth a look. Piazza, Peter Apr 1, 2005 457
The 39 steps to IT security. Piazza, Peter Brief Article Apr 1, 2005 169
Information security: where we've been and where we need to go. Hinojosa, Patrick Feb 1, 2005 562
The end of information technology. Yi, Hyong Dec 22, 2004 1840
Sygate warns businesses of risks of IT threats after summer holidays. Brief Article Sep 6, 2004 148
Managing IT threats. Powledge, Tom Aug 1, 2004 694
Who should lead in system selection? The IT manager has nudged the security director aside when it comes to system selection. It's time for security to get back into the action. Witmer, Joseph T. Aug 1, 2004 958
Does security set the right goals? Before spending money on purchasing security technology, make sure that the investment will promote the organization's business goals. Kim, Gene Jun 1, 2004 1480
USDA starved for security. Brief Article May 1, 2004 98
Cybercrime-fighting tools still lacking. May 1, 2004 462
IT security more important than cost cuts, say UK firms. Brief Article Apr 9, 2004 142
Guide provides effective IT security practices for higher education. Brief Article Apr 1, 2004 189
Guarding the virtual vault: businesses in all sectors now recognize the value of information. Unfortunately, so do criminals. Data theft has become a multi-billion dollar problem that no company can afford to ignore. Stoller, Jacob Feb 1, 2004 1254
Federal government gets 'D' in cyber security. Fein, Geoff S. Feb 1, 2004 310
Move beyond patch management: correlation threat-management engines can reduce the time needed to check syslog files. Hollows, Phil Jan 1, 2004 1130
IT security reactive, not proactive. Brief Article Jan 1, 2004 85
Detroiter tip: security. Dec 1, 2003 221
Five steps to securing wireless. Broderick, J. Stuart Nov 1, 2003 368
Expert advice. Oct 10, 2003 1162
ASEAN Sets Target for IT Security. Brief Article Oct 3, 2003 104
Data assurance. Brief Article Sep 10, 2003 1802
Preventative medicine. Sep 10, 2003 1634
Beating the blackout. Sep 10, 2003 515
Federal IT security improving. Brief Article Aug 1, 2003 109
Financial companies focus on InfoSec. Piazza, Peter Aug 1, 2003 338
TELECOMMUNICATIONS: INDUSTRY GROUPS JOIN FORCES TO AVERT COSTLY DATA RETENTION LAWS. Jun 11, 2003 530
Getting IT training right. (Tech Talk). Piazza, Peter Jun 1, 2003 507
States struggling with IT security. (Tech Talk). Piazza, Peter Jun 1, 2003 359
Take control of the physical layer: tracking network problems is often like finding a needle in a haystack. (Infrastructure). Galin, Liam May 1, 2003 561
Report security breaches: new rules aid privacy efforts, but challenge businesses. (2003 Technology & Business Resource Guide: Privacy Protection). Savin, Jerald M. May 1, 2003 1036
Cybersecurity: who's watching the store? Government is not doing all it could to research the problem or to exercise its proper regulatory role. Berkowitz, Bruce; Hahn, Robert W. Mar 22, 2003 5080
Red flags. (Internet Security). Mar 1, 2003 775
The global threat to information technology security. (Software Intelligence: Security). Love, David Mar 1, 2003 1636
Instant messaging could introduce security vulnerabilities claims ictnet. Brief Article Feb 24, 2003 134
Centrally managed network security: hope or reality? Don't wait for the standards to evolve. (Software Intelligence). Thomsen, Dan Feb 1, 2003 1055
Clarke: attack on the internet 'worrisome'. (Security Beat). Book, Elizabeth G. Brief Article Feb 1, 2003 176
Wake up call to company directors over IT security. (Security). Brief Article Jan 1, 2003 118
IT pragmatics: how much safer is IT?. (Views You Can Use). Williams, Jeff Column Dec 22, 2002 1124
IDC predicts that security spending will rise in Western Europe. Brief Article Nov 27, 2002 110
Disaster recovery: redefining disaster recovery as 24x7. (Storage Networking). Robinson, Steven Industry Overview Nov 1, 2002 920
Learning Tree survey shows UK businesses are not concerned enough about online crime. Brief Article Oct 15, 2002 167
Security- today and tomorrow. (Viewpoint). Kilpatrick, Ian Oct 1, 2002 1910
Better backups: an easy way to protect your data. (Tech). Stoddard, Joe Column Oct 1, 2002 604
Zone security considerations for SANs: overcoming inadvertent overwrites. (Storage Networking). Chudnow, Christine Taylor Oct 1, 2002 1663
New survey examines cyberterrorism concerns. Brief Article Sep 16, 2002 125
The social side of security. Sep 10, 2002 1767
Fertile fields: the healthcare sector represents an enormous prospective purchaser of security solutions. But the solutions that healthcare organizations choose--and why they choose them--reflect a portrait of organizations with plenty of ramp-up potential. (Security). Porter, William Sep 1, 2002 1761
Managing information security. (Current Research). Lohmeyer, Daniel F.; McCrory, Jim; Pogreb, Sofya Statistical Data Included Aug 6, 2002 933
Total cost of survival: the new metric for business continuity. Moore, Fred Aug 1, 2002 1089
Securing network infrastructures: meshed topographies simultaneously preserve security and accessibility. (Storage Networking). Ross, Cecilia Aug 1, 2002 2944
BSA survey shows US businesses are expecting a major Internet attack in the next year. Brief Article Jul 26, 2002 102
Diminishing cyber disk. (Short Takes). Brief Article Jul 1, 2002 276
NIST reviews security of Indian Trust Management, department of the interior. (General Developments). Brief Article Jul 1, 2002 156
Technology and the reasonable director. (Executive Tech Accountability). Ferrara, Donna Jul 1, 2002 1748
Role-based access control. (Tech Talk). Piazza, Peter Brief Article Jul 1, 2002 157
Safety first. (Business & Finance). Gibeily, Carl Jun 1, 2002 1162
Risky business: internal audit teams up with the audit committee to tackle IT security needs. Quinn, Lawrence Richter Jun 1, 2002 3586
The critical importance of information security. (The Scoop). Brief Article Jun 1, 2002 141
Security survey: Your responses. Brief Article May 10, 2002 262
Top Layer Networks' survey shows companies' security concerns. Brief Article May 8, 2002 127
Keep the Digital Jewels in the vault: a coordinated information protection program can eliminate vulnerabilities that would leave digital intellectual property unprotected. Boni, William C. May 1, 2002 2658
Seventh NIAP Common Criteria Testing Laboratory approved for it security testing. (News Briefs). Brief Article May 1, 2002 224
20% of servers at Japan firms face hacking risk: group. Brief Article Mar 18, 2002 169
NIST publishers Information Technology Security risk management guideline. (News Briefs). Brief Article Mar 1, 2002 177
Secret service cybertools. (Tech Talk). Piazza, Peter Brief Article Mar 1, 2002 262
The electronic witness. (Investigations). Bryson, Curt Mar 1, 2002 2117
INFORMATION SOCIETY: COUNCIL DEBATE ON CRACKING DOWN ON CYBER CRIME HOTS UP. Brief Article Feb 13, 2002 377
Paying the price for security: The financial and social costs of protecting digital information are growing exponentially. (IT Feature). Poynder, Richard Feb 1, 2002 1343
Healthcare low spender on Information Security. (Security). Brief Article Feb 1, 2002 173
IT Risk Is Also Legal Liability. (Tech Talk). Brief Article Dec 1, 2001 354
Self-Testing IT Systems. (Tech Talk). Brief Article Dec 1, 2001 176
ZIFF DAVIS EDITORIAL INITIATIVE TO HELP PROTECT TECH. INFRASTRUCTURE. Brief Article Sep 30, 2001 205
ESC: PLENARY PREPARES FOR FUTURE-OF-EUROPE DEBATE. Brief Article Sep 19, 2001 704
Law enforcement technology. Brief Article Aug 1, 2001 106
the reality of hackers. Nickson, Stephen; Kates, Jim Statistical Data Included Jul 1, 2001 3521
Defense Faces Cyber-Challenges. Jul 1, 2001 590
Beyond the Figurehead Facade. MURPHY, BRUCE L. Jul 1, 2001 2646
NIST CO-SPONSORS GOVERNMENT-INDUSTRY IT SECURITY FORUM. Brief Article May 1, 2001 215
DISASTER RECOVERY. BRUNETTO, GUY; HARRIS, NORMAN L. Mar 1, 2001 2174
15 million [pounds sterling] boost for e-fraud projects. Prickett, Ruth Brief Article Nov 1, 2000 402
Greater cooperation sought in protecting critical infrastructure. Brief Article Sep 22, 2000 780
NIST ADDRESSES NEED FOR SECURITY METRICS. Brief Article Sep 1, 2000 123
Requirements for E-business Security. Aug 1, 2000 1735
E-mail, the internet, and other legal and ethical NIGHTMARES. SHALLER, DOUGLAS R. Aug 1, 2000 1873
Information Technology Security Engagements: An Evolving Specialty. Nearon, Bruce H. Jul 1, 2000 2513
How strong is your safety net? Mar 1, 1997 532
National cryptography policy for the information age. Dam, Kenneth W.; Lin, Herbert S. Jun 22, 1996 3423
Heeding humanity. Arbetter, Lisa Jun 1, 1994 538
Do you trust your employees? Luker, Norman W. Sep 1, 1990 3270

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters