Opinion

Opinion

  • Developing flexible instant messaging guidelines

    From its beginnings in the early 1990s, instant messaging (IM) has developed into a powerful business tool, giving internet users access to a simple presence facility, as well as acting as a linchpin for online conferencing, whiteboarding and other ...  Continue Reading

  • Security Zone: Keep IT security separate

    Roles, teams and even entire departments are often combined to streamline efficiency and reduce costs, but this is not always as straight-forward as it...  Continue Reading

  • Government U-turn on file-sharing measures

    The Department of Business Innovation and Skills (BIS) has released a government statement drastically changing the content of its current consultation on proposed legislation to address illicit Peer-to Peer (P2P) file-sharing, writes Scott ...  Continue Reading

  • Best practice for IM security

    Corporate IT Forum members collectively believe that the triangle of trust around security is policy, enforcement and education. Obviously, individual organisations must decide how far they want to go with each of these, depending on the nature of ...  Continue Reading

  • IM security: the triangle of trust

    Corporate IT Forum members collectively believe that the triangle of trust around security is policy, enforcement and education. Obviously, individual organisations must decide how far they want to go with each of these, depending on the nature of ...  Continue Reading

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close