News

IT strategy

  • July 21, 2005 21 Jul'05

    Sarbox draining corporate security budgets

    Corporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF).

  • July 21, 2005 21 Jul'05

    Can alcohol mix with your key personnel?

    I persuaded our MD to hire a dedicated IT security expert. I am pleased with his work, but on several occasions he has smelled strongly of drink. How do I nip this in the bud?

  • July 12, 2005 12 Jul'05

    Tony Asaro: Blogs and more

    Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts.

  • July 12, 2005 12 Jul'05

    Sarbox challenge drains security budgets

    International corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum.

  • July 06, 2005 06 Jul'05

    This is not your father's hacker

    While Sasser author Sven Jaschan awaits the outcome of his trial this week in Germany, a new cybercrime report explains why the teenager is becoming an anachronism.

  • July 06, 2005 06 Jul'05

    PING with Karen Worstell

    The Microsoft CISO discusses how she keeps Redmond and its products secure.

  • July 04, 2005 04 Jul'05

    Sasser author issues courtroom confession

    Sven Jaschan's mea culpa was expected after he earlier admitted to creating the last major malware outbreak more than a year ago.

  • June 21, 2005 21 Jun'05

    Continuing education options for CISSPs: Top 10 ways to earn CPEs

    Who says you can't have fun while earning CPE credits? Check out the top 10 ways to meet CISSP® and SSCP continuing professional education requirements.

  • June 13, 2005 13 Jun'05

    Gartner underscores five overblown threats

    Two Gartner analysts debunk five overhyped security risks they claim are causing companies to miss out on some key emerging technologies.

  • June 06, 2005 06 Jun'05

    Spyware removal checklist

    A step-by-step guide on how to remove spyware using antispyware tools including Spybot -- Search and Destroy, and HijackThis.