IT strategy
IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.. See complete definition.
-
Opinion
02 May 2025
Security Think Tank: What CISOs can learn from Signalgate
A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error. Continue Reading
-
News
02 May 2025
Retail cyber crime spree a “wake-up call”, says NCSC CEO
The NCSC confirms it is providing assistance to M&S, Co-op and Harrods as concerns grow among UK retailers Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Jun 2005
Gartner underscores five overblown threats
Two Gartner analysts debunk five overhyped security risks they claim are causing companies to miss out on some key emerging technologies. Continue Reading
By- Amy Storer, News Writer
-
News
06 Jun 2005
Spyware removal checklist
A step-by-step guide on how to remove spyware using antispyware tools including Spybot -- Search and Destroy, and HijackThis. Continue Reading
-
News
06 Jun 2005
Know your enemy: Why your Web site is at risk
In this Lesson 1 technical paper from Web Security School, guest instructor Michael Cobb outlines the threats to Web sites and who is behind them. Continue Reading
-
News
06 Jun 2005
Developer's active content delivery checklist
Rules for developing secure dynamic content for an IIS Web server. Continue Reading
-
News
05 Jun 2005
Quiz: Secure Web directories and development, answer No. 4
Quiz: Secure Web directories and development, answer No. 4 Continue Reading
-
News
05 Jun 2005
Quiz: Secure Web directories and development, answer No. 5
Quiz: Secure Web directories and development, answer No. 5 Continue Reading
- News 05 Jun 2005
- News 05 Jun 2005
-
News
05 Jun 2005
Quiz: Secure Web directories and development
Evaluate your knowledge of Web threats and how to defeat them. Questions cover security risks of dynamically created content and proper security management. Continue Reading
-
News
04 Jun 2005
Top tools for testing your online security, part 2
Michael Cobb explains what tools are helpful in maintaining Web security, including security scanners, benchmarking tools, monitoring services and online resources. Continue Reading
-
News
04 Jun 2005
Life at the edge part 4: When things go wrong
A checklist and other hints to protect your Web servers from a worst-case scenario. Continue Reading
-
News
03 Jun 2005
Quiz: Identify and analyze Web server attacks, answer No. 3
Quiz: Identify and analyze Web server attacks, answer No. 3 Continue Reading
-
News
01 Jun 2005
Zombie machines used in 'brutal' SSH attacks
IT managers use SSH to gain secure access to remote computers. Hackers are using it to crack your network, with help from their zombie friends. Continue Reading
By -
News
29 May 2005
Patching resource kit
From vulnerability scanning to patching flubs, here's a collection of other helpful resources to ensure your patching efforts are effective. Continue Reading
-
News
23 May 2005
Pre-CISSP: Options for the security newbie
Shon Harris advises novice security practitioners on the value of entry-level certifications -- and good, old-fashioned experience -- in preparation for the CISSP®. Continue Reading
-
News
17 May 2005
Should the government define spyware?
Who's best qualified to define what is and isn't spyware -- your congressman or your online user community? Security experts say no entity can do it alone. Continue Reading
By -
News
17 May 2005
Some vendors get labeled as spyware pushers
To win the battle with spyware, you must be able to spot it. That's not as easy as you think. Continue Reading
By -
News
11 May 2005
A new era of computer worms: Wireless mobile worms
In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm. Continue Reading
-
Feature
10 May 2005
Learning Guide: Low-cost storage
Resources on low-cost networking, iSCSI, SATA and IP storage Continue Reading
-
News
25 Apr 2005
Tight contract management vital, users told at SSRG debut
The Strategic Supplier Relationships Group, which brings together 10 of the UK's most influential IT user groups, was formally... Continue Reading
By -
Feature
25 Apr 2005
Lead from the top
The starting line for effective data security is at board level, writes John Kavanagh in this review of current thinking and... Continue Reading
-
News
19 Apr 2005
LogicaCMG on Met payroll
The Metropolitan Police Authority has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration... Continue Reading
-
Feature
15 Apr 2005
The acceptable rules of the mobile game
Mobile networks allow you to connect to your network from almost anywhere by the appropriate methodology. Yet that may also mean... Continue Reading
-
News
14 Apr 2005
Who should be on (and off) the hook for ID theft?
An influential cryptographer and a panel of technologists today debate how best to fight false authentication and fraudulent transactions. Continue Reading
By- Anne Saita, TechTarget
-
News
14 Apr 2005
Spike ** LogicaCMG to manage Met payroll
The Metropolitan Police Authority (MPA) has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration... Continue Reading
-
News
12 Apr 2005
Met Police gets LogicaCMG on payroll
The Metropolitan Police Authority (MPA) has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration... Continue Reading
-
News
03 Apr 2005
Are identities safer on laptops than central databases?
Microsoft pledges better ID security. Given the theft of a laptop storing 100,000 Social Security numbers, Redmond's approach could prove controversial. Continue Reading
By- SearchSecurity.com Staff
-
News
29 Mar 2005
Quiz: Do you have a firm e-mail security foundation?
This Security School quiz is the first in a series of three on e-mail security essentials. Continue Reading
-
News
24 Mar 2005
Atos wins DWP deal extension
The Department for Work and Pensions has renewed a contract with IT services company Atos Origin to deliver medical advice and... Continue Reading
-
News
21 Mar 2005
Linux lags Windows in new security report
A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well. Continue Reading
By- Anne Saita, TechTarget
-
News
17 Mar 2005
Botnets more menacing than ever
Researchers from the Honeynet Project and iDefense say bots are spreading quickly, digging their heels into more than a million machines around the world. Continue Reading
By -
Feature
16 Mar 2005
Managed services: Looking to the long term
IT directors looking for an easy way to manage increasing volumes of data by buying more hardware could be storing up problems... Continue Reading
-
News
15 Mar 2005
ID theft and national security
Check out what some ITKnowledge Exchange members had to say about this controversial issue. Continue Reading
-
News
14 Mar 2005
HIPAA causes data security problems for small businesses
If your local dentist isn't complying with HIPAA's security rules, he's not alone. Experts say most doctors' offices aren't getting it. Continue Reading
By - News 14 Mar 2005
-
Feature
13 Mar 2005
Winning the cyber arms race in the classroom
In the struggle for cybersecurity, Lenny Zeltser's most important weapons are the classroom and the pen.
For the past few years he has taught part-time at the SANS Institute, creating a course on how to analyze malicious software,. He's also directed security efforts for several organizations as a consultant and employee. As a writer, he co-authored Inside Network Perimeter Security and contributed a few chapters to the book Malware: Fighting Malicious Code.
In this Q&A, Zeltser outlines his latest course offerings and book projects, and what he sees as today's greatest threats.
Continue ReadingBy - News 08 Mar 2005
-
News
08 Mar 2005
A sound architecture involves both strong technology and a professional approach
Although many large organisations need to respond rapidly to changes in the market as well as to competition and globalisation... Continue Reading
By- Alan Brown
-
News
07 Mar 2005
Windows vulnerable to LAND attack
Security researchers say this type of attack leaves enterprise customers of popular Windows products open to a denial of service. There is good news, though. Continue Reading
By -
Feature
25 Feb 2005
Whisky galore with IP
Chivas can toast future success thanks to a cost-effective IP data network Continue Reading
-
News
24 Feb 2005
Security Bytes: Cisco patch available for ACNS flaws
Workaround outlined for new php exploit. IBM issues patch for DB2 flaw. Payroll service goes offline to investigate security claims , and BoA loses personal data on customers. Continue Reading
By- SearchSecurity.com Staff
-
News
15 Feb 2005
Federal agency security still poor, but improving
Report cards give federal security a D-plus average, but the Homeland Security Department is still failing. Continue Reading
By- Keith Regan, Contributing Writer
- News 14 Feb 2005
-
News
14 Feb 2005
Strategic Storage: DR planning blueprint
Developing a good disaster recovery (DR) plan is similar to good dental hygiene -- and almost as exciting. Similar to going to the dentist twice a year, you should also test your DR plan with the same frequency. Wait too long to clean up your plan and you'll be stuck with the root canal of recovering your data. Continue Reading
By -
News
09 Feb 2005
The Controversy of Hacking Books and Classes
Read this excerpt and download Chapter 1, Ethics of Ethical Hacking from Shon Harris' All-in-One Gray Hat Hacking. Continue Reading
-
News
07 Feb 2005
CEOs and CIOs split on IT success
Business and IT directors are still at loggerheads on key technology issues, according to a new survey by the Economist... Continue Reading
By -
News
02 Feb 2005
Compressed files strike another blow to AV
The "alternative" .rar files are picking up where popular .zip files left off as attack vectors. Continue Reading
By- Shawna McAlearney, News Editor
-
News
31 Jan 2005
ID theft remains No. 1 worry
For the fifth straight year, the FTC said most complaints came from identity theft victims. And that's a problem for enterprises. Continue Reading
By -
News
23 Jan 2005
Cyberstorm chasers: The folks who look out for the latest Internet threats
They keep a 'round-the-clock watch on conditions in cyberspace. CTO Johannes Ullrich discusses the volunteer effort behind the SANS Internet Storm Center. Continue Reading
By - News 19 Jan 2005
-
Feature
14 Jan 2005
Financing the future
Don't get a headache working out the best ways to pay for hardware and software. Danny Bradbury offers a user-friendly guide to... Continue Reading
-
News
10 Jan 2005
Security Bytes: George Mason U. hacked; new Trojans on the loose
Hackers steal personal data of more than 30,000 members of George Mason University. Two new Trojans emerge. BMC Software buys a Parisian company. Continue Reading
By- SearchSecurity.com Staff
-
News
10 Jan 2005
Security on a Shoestring: Creating Internet policies on the cheap
No matter how small the organization, it's impractical to stand over employees and make sure they properly use the Internet. So here's how to write a decent acceptable use policy, and make sure everyone abides by it. Continue Reading
By- Mathew Schwartz, Contributor
-
News
19 Dec 2004
Transforming the cybersecurity culture
Eleven New Year's resolutions can help employees at all levels empower the security function at their organization. Continue Reading
By- Shawna McAlearney, News Editor
-
News
08 Dec 2004
The security lingo of 2004
This was the year of botnets, zombie PC armies and phishying online schemes. Continue Reading
By -
News
28 Oct 2004
MoD may write off £200m Chinook helicopters
The Ministry of Defence could write off more than £200m spent on eight Chinook Mk3 helicopters. Continue Reading
By -
Feature
21 Oct 2004
IP everything, essentially
What are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Continue Reading
-
Feature
21 Oct 2004
The basis of profitability
Not so long ago, you didn't have much choice - your IT and communications requirements were acquired, implemented and maintained... Continue Reading
-
News
08 Oct 2004
First integrated children's system goes live
The first web-based system to help councils meet new legal requirements for information sharing among teachers, social workers... Continue Reading
- News 04 Oct 2004
-
News
03 Oct 2004
Training for CISSP Certification: SearchSecurity.com's Security School
Study guides for each of the ten domains of the CBK for those preparing to take the CISSP exam or expanding their knowledge of security concepts and practices. Continue Reading
-
News
26 Sep 2004
Authorize.Net says it has 'learned' from attack
The credit card processing service was unprepared for the kind of attack it suffered last week, but it will use the experience to improve security. Continue Reading
By -
Feature
14 Sep 2004
The gift of CRM
For Red Letter Days, a provider of gift experiences for corporates and consumers, a CRM system was essential to give it market... Continue Reading
-
Feature
14 Sep 2004
Management matters
Cath Everett finds out how you stay on top of networking. What are the management issues related to your telecoms and networks... Continue Reading
-
News
27 Aug 2004
Over-specify when buying low cost replacement for Frame Relay
A project manager reveals how a VPN saved £275,000 a year Continue Reading
By- Peter Skipwith
-
News
24 Aug 2004
Latest worm uses IM to lure victims
A version of the worm which spread from infected Microsoft Internet Information Services (IIS) web servers in June has been... Continue Reading
-
News
27 Jul 2004
New attacks and vulnerability trends highlighted at Black Hat
Presentations beginning today will analyze vulnerabilities, zero-day code, phishing and secure wireless deployment, among many other topics. Continue Reading
By- Shawna McAlearney, News Writer
-
News
26 Jul 2004
Fewer IT supplier conflicts are going to court
Law firms have reported a sharp fall in the number of IT disputes reaching the courts over the past 12 months as more users turn... Continue Reading
By- Bill Goodwin, Computer Weekly
- News 25 Jul 2004
-
News
18 Jul 2004
Debian fixes multiple flaws
Denial-of-service, buffer overflow and format string vulnerabilities in Debian GNU/Linux that an attacker could use to remotely execute malicious code has been fixed. Continue Reading
By -
News
18 Jul 2004
Enterprise-class RAID functions, part 2: N-way mirroring, splitting and more
With the convergence of RAID and lower-priced storage technologies, advanced RAID functions can be enjoyed by any small-to-medium sized organization with critical data. Continue Reading
By- Randy Arnott
-
News
21 Jun 2004
Users at risk after web host attack
Users have been warned to brace themselves for attacks on sites which provide patch downloads and web hosting services. Continue Reading
By -
News
01 Jun 2004
Report finds computer system likely culprit in Chinook crash
A former air commodore - one of the highest ranks in the RAF - has questioned the airworthiness of the Chinook Mk2 helicopter... Continue Reading
By -
News
01 Jun 2004
Chinook 10 years on
This week sees the 10th anniversary of the Chinook ZD576's crash, as former top military officers cast doubt on the finding that... Continue Reading
By -
News
28 May 2004
Ex-RAF chief says no to blame on Chinook
A former RAF air commodore has questioned the integrity of systems and the airworthiness of the type of Chinook helicopter which... Continue Reading
By -
News
23 May 2004
Hacking for Dummies: Chapter 10 -- Wireless LANs
Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver. Continue Reading
-
News
19 May 2004
IT experts not losing sleep over code theft
Days after Cisco acknowledged someone may have stolen source code from its network, IT experts said they doubt it will amount to anything catastrophic. After all, source code has made it onto the Internet before, and there's no proof it has ever led to an attack. For them, the bigger question is how to prevent such a thing from happening to their organization. Continue Reading
By -
News
13 May 2004
Hacking For Dummies: Chapter 7 -- Passwords
In his latest book, "Hacking For Dummies," Kevin Beaver takes the reader into the mindset of a hacker in order to help admins fend off vulnerabilities and attacks. Continue Reading
-
News
02 May 2004
Return to sender?
Several researchers have identified a new e-mail attack that can be used to swamp enterprise e-mail servers, as well as some secondary systems. Continue Reading
By- Hank Hogan, Contributing Writer
-
News
15 Apr 2004
Bacs launches online billing service
UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and... Continue Reading
By - News 11 Apr 2004
-
Feature
22 Mar 2004
Is the national programme for NHS IT set to be 'the biggest gamble in the world'?
The private concerns of clinicians and IT professionals about the national programme are not being addressed, despite the front... Continue Reading
By -
News
17 Mar 2004
Best practices for enabling and maintaining compliance
As part of our Storage Decisions conference preview series, Shaun Mahoney, senior storage engineer for Citigroup, Randy Wilson, assistant vice president of IT at Essex Investment Management Company and Enterprise Storage Group's Peter Gerr discussed the best practices for enabling compliance. Continue Reading
By- Mark Lewis, Editor
-
Feature
15 Mar 2004
Achieving the goal of CIO
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
By - News 01 Mar 2004
-
News
15 Dec 2003
IT staff predict e-government success despite councillors’ doubts
Tony Blair has failed to convince councillors in almost half of the UK’s local authorities of the value of e-government. Continue Reading
By- James Rogers
-
Feature
03 Dec 2003
On the right side of the law
What are the legal and regulatory issues that could affect the running of your company? What are the ramifications of the Data... Continue Reading
-
News
11 Nov 2003
MPs slam Libra as one of UK's worst PFI deals ever
Costs more than double and Whitehall shoulders risk on magistrates IT. Continue Reading
By -
News
10 Nov 2003
NHS IT plan risky but will not fail, says OGC
The £2.3bn national programme to modernise health service IT systems is "risky and ambitious" but it has sufficient safeguards in... Continue Reading
By -
News
28 Jul 2003
Court blocks former ICL solicitor's Pathway claim
Fujitsu has won a court ruling to stop a former solicitor for the company pursuing allegations about the government's disastrous... Continue Reading
By -
Feature
28 Apr 2003
Fujitsu won £800m Post Office contract after misrepresenting itself, says lawyer
High Court claim by ex-employee makes damning accusations Continue Reading
By -
Feature
26 Mar 2003
What's in an IT name?
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
By -
News
10 Feb 2003
UK firms are offered help to migrate to open source
Companies are being given help to migrate to free-license software by a joint initiative from OpenForum Europe and the National... Continue Reading
By -
News
06 Feb 2003
Users warned as number of software holes soars
IT departments were put on alert this week after it emerged that the number of security vulnerabilities discovered in commercial... Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Feb 2003
NHS £5bn IT procurement finally begins
The Department of Health (DoH) has launched the formal procurement process for its £5bn restructuring of NHS IT. Continue Reading
By- James Rogers
-
News
29 Jan 2003
Courts Libra system 'is one of the worst IT projects ever seen'
The cost of the Libra project to provide a national system for 385 magistrates courts soared from £146m to £390m, and the main... Continue Reading
By -
News
13 Oct 2002
Jamie Gruener's position on API sharing
Key questions on API sharing answered Continue Reading
By- SearchStorage.com
-
News
20 Jun 2002
MoD's Chinook tactics spark a constitutional row
Chinook: The MoD's actions over the crash of Chinook ZD576 could have legal ramifications Continue Reading
By -
Feature
02 May 2002
Director's cut: Learning to spot winning technologies
Faced with a stream of new technologies it is vital that IT directors keep abreast of the latest developments and are aware of... Continue Reading
-
Feature
29 Apr 2002
The Heat is on
Since the 1960s, Moore's Law has described the progress of the IT industry but overheating could slow down the pace of change Continue Reading
By- Graham Titterington