In Depth
In Depth
Enterprise software
-
Protecting wireless networks: Step 2
Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
-
Identity and Access Management Security School
This Security School explores critical topics related to helping security practitioners establish and maintain an effective identity and access management plan. Continue Reading
-
Security blog log: Fear and loathing in MS06-040's wake
This week, security bloggers wonder if some of the MS06-040 warnings have gone too far. Meanwhile, Symantec uses its blog to warn about the timed release of exploits. Continue Reading
-
Inside MSRC: Time to rethink security workarounds
Christopher Budd of the Microsoft Security Response Center recommends implementing one of several security workarounds to ensure a secure infrastructure until this month's most important Windows update can be installed. Continue Reading
-
Thwarting IM management challenges
Product review: Information Security magazine's Sandra Kay Miller says Symantec's IM Manager 8.0 has limited public network features, but offers excellent reporting Continue Reading
-
Akonix A-Series offers complex, best-of-breed IM security
Product review: Information Security magazine's Sandra Kay Miller says The Akonix A-Series instant messaging security appliances works well but needs better documentation. Continue Reading
-
Security event management, no strings attached
Product review: Information Security magazine's Joel Snyder says Check Point's vendor-agnostic Eventia Analyzer 2.0/Eventia Reporter is worth consideration despite limited BI options. Continue Reading
-
Web services represent security's next battlefront
The evolution and mainstream use of Web services has placed the nascent technology in the crosshairs of attackers, and one firm in particular says it can mitigate the threats. Continue Reading
-
PING with Heidi Kujawa
Heidi Kujawa, director of enterprise architecture services for Sony Pictures Entertainment, explains how combatting piracy takes more than just keeping bootleggers out of the theatres Continue Reading
-
Automated provisioning quiz answers
the key questions answered Continue Reading
-
Inside MSRC: Debunking Excel exploits
Microsoft's Christopher Budd puts the magnifying glass to Microsoft's July bulletinsand says one alleged Excel exploit isn't what it seems. Continue Reading
-
XML Security Learning Guide
Securing XML is an essential element in keeping Web services secure. This SearchSecurity.com Learning Guide is a compilation of resources that review different types of XML security standards and approaches for keeping your XML Web services secure. Continue Reading
-
Case study: A valuable solution
A new telephony and call centre solution from Inter-Tel has transformed the way that e.surv Chartered Surveyors is able to work. Continue Reading
-
Storage Word Search: Summer IT fun
How about some summer storage fun? Try out SearchStorage.com's Word Search game. See if you can find the 15 terms listed. Continue Reading
-
SMB finds the perfect host
When All3Media, a medium-sized TV programming producer, inherited an inflexible communications system, it turned to a more appealing, hosted alternative. Continue Reading
-
Industry chiefs to declare war on for-profit cyber criminals
IT industry leaders reaffirm the importance of security to a digital economy beset by money-driven cyber criminals. Continue Reading
-
Be careful you don't get more than you pay for with VoIP
Implementing VoIP is attractive for all companies in particular SMBs. However, there are issues to address that may cost you more than what you save Continue Reading
-
Voicing concerns on Skype
Skype has blazed a trail in the Voice over IP arena; its popularity hasn’t gone unnoticed by the hacker community however Continue Reading
-
Lost at sea: securing the channel
As attacks seem to proliferate almost unabated, it’s worrying to think that of the three interested parties in the security technology market — the technology makers, the technology sellers and the technology users—not everyone shares a common view ... Continue Reading
-
Riding the wave of change
CIOs can thrive as pace of change quickens, argues Des Lee Continue Reading
-
delivering profits
-
B&Q boosts efficiency and cuts costs by replacing e-mail with workflow software
-
Storage 911: How to troubleshoot your storage
Our emergency guide takes you through the steps you can take to prevent disaster, and then, more importantly, offers an organized list of usual suspects, from the complex to the deceptively simple. Continue Reading
-
Controlling IT waste and redundancy through recentralization
A typical decentralized organization has many different departments such as accounting, HR, and manufacturing—all are defining and building IT infrastructures to support applications. In a decentralized environment, there is a structure in ... Continue Reading
-
Learning Guide: Low-cost storage
Resources on low-cost networking, iSCSI, SATA and IP storage Continue Reading
-
Managed services: Looking to the long term
IT directors looking for an easy way to manage increasing volumes of data by buying more hardware could be storing up problems... Continue Reading
-
Financing the future
Don't get a headache working out the best ways to pay for hardware and software. Danny Bradbury offers a user-friendly guide to... Continue Reading
-
Grid gobbledygook hits storage
Fearful as always of missing the boat, storage vendors are jumping on the grid bandwagon, unveiling visions that are about as useful today as a chocolate teapot. Continue Reading
-
The gift of CRM
For Red Letter Days, a provider of gift experiences for corporates and consumers, a CRM system was essential to give it market... Continue Reading
-
Achieving the goal of CIO
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
-
Thought for the day: Flights of fancy
The Windows versus Linux debacle continues to escalate into a heady mix of emotion, mud-slinging and complexity Continue Reading
-
Thought for the day: Flights of fancy
Launch a Java-based office suite? Simon Moores questions the sanity of any company that would consider doing so, even if it is... Continue Reading
-
Insurance lacks pulling power
Insurance companies need to give their e-initiatives a radical makeover as their present inward focus is driving customers away Continue Reading
-
CBI warns on cybercrime
A new survey warns that UK e-commerce is being stifled by rising crime and consumer caution about buying goods on the Internet Continue Reading
-
Taxing times for global issues
International traders have always had to overcome a complex array of tariffs and local tax laws. But with the advent of... Continue Reading
-
Government picks pathfinder councils
-
Government makes grants to council IT schemes
-
Growing pains of dotcom start ups
-
When all is safely gathered in
Portals are a great way to gather all of your company's services into one easily accessible place. Danny Bradbury takes a look at... Continue Reading
-
Growing pains
Five e-commerce companies tell E-Business Review how they overcame initial teething problems Continue Reading
-
Leaked MoD notice reveals new Chinook system hazard
The MoD has claimed that the problems with the Chinook's Fadec software were minor faults. Yet a leaked MoD notice warns of a... Continue Reading
-
Grpup-buying sites prove unpopular
Group buying sites seemed like a good idea, but failed to attract much attention. Sun and Microsoft's sites, on the other hand,... Continue Reading
-
Spring has sprung for Spring
Spring Group has moved its business environment on-line with the development of a fully integrated web operating system. Continue Reading
-
The 3 flavours of 2001
Before the end of the year, three new technologies will emerge triumphant. Sanjay Manandhar reports. Continue Reading
-
Towards an inclusive future
Leeds City Council is fighting social exclusion using customer service centres. Paul Donovan reports Continue Reading
-
A big blueprint for e-business
Companies have been making mistakes with their e-business strategies since the whole brouhaha over online commerce started. But... Continue Reading
-
Not-very-mobile-commerce
Mobile commerce is a dream coming true, say the telcos. Well they would, wouldn't they? Simon Quicke reports Continue Reading
-
Chinook report slams flawed MoD procurement methods
Public Accounts Committee report into fatal crash of a Chinook Mk2 helicopter focused on a report by independent contractor EDS-Scicon, which was hired to assess the Chinook’s Fadec engine control system Continue Reading
-
Pathway and the Post Office: the lessons learned
The infamous 1996-1999 Pathway project aimed to computerise the nation’s post offices and tackle benefit fraud. But 18 months... Continue Reading
-
Customers could be winners as Abbey risks opening up to rivals
Abbey National's online mortgage service will break new ground, but it is not without risks. Nick Huber reports Continue Reading
-
The Chinook accident in 1989 - the facts
Problem with fault logic of FADEC software identified at key meeting Continue Reading
-
Planning for e-commerce: balance your workload
Capacity planning isn't easy, but it's not rocket science either, says Danny Bradbury. And that makes the recent failure of some... Continue Reading
-
January-February
Tesco target of 300 online shops within one year Continue Reading
-
Case Study: ProLiant servers by Compaq
Building a gas pipeline connecting Britain and the continent proved to be an enormous task, but it’s proved to be a project built... Continue Reading
-
White Paper: Software solutions for effective network power management
Uncertain power conditions can wreak havoc on small businesses, however, there are ways to limit the risk of computer data loss Continue Reading