News

IT strategy

  • September 26, 2005 26 Sep'05

    Secure the interests of your extended enterprise

    How do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security?

  • September 22, 2005 22 Sep'05

    Who best to avert data security disaster: government or business?

    People look to government to prevent catastrophe. But in the Information Age, some of those people, namely those working in IT shops, need to do their part to protect us.

  • September 22, 2005 22 Sep'05

    Telework key to surviving security disaster, expert says

    Cybersecurity Industry Alliance Executive Director Paul Kurtz explains why telework may be crucial to surviving The Big One.

  • September 21, 2005 21 Sep'05

    Leave no trace: Understanding attackers' motives

    This excerpt from Chapter 1 of "Rootkits: Subverting the Windows Kernel," explains the purpose of back doors and how hackers use them, as well as how stealth plays a major role in most successful attacks.

  • September 21, 2005 21 Sep'05

    Catastrophic cyberattack unlikely, experts say

    Predictions of a cataclysmic disaster have been around for awhile. But one security officer cites reasons why the Internet can never be brought down.

  • September 20, 2005 20 Sep'05

    SAS drives product roundup

    Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market.