91ÖÆÆ¬³§

Tagged - security

Safety on the Net: Authentication, Pseudonymity, and Resilience vs. Increasing Threats

Vint Cerf, Google's Chief Evangelist and the "Father of the Internet," joins his longtime friend Larry Smarr, himself one of the technology heroes of the age, onstage for a...

International Challenges to Innovation Protection

I believe that everyone needs to hear Sir Richard's thoughts and cautionary comments on the subject of the Chinese People's Liberation Army attacking commercial and...

Privacy Protection: Going Global

Privacy regulations are about to become one of the great constraining forces on e-commerce, and one of the final legal bastions of personal protection for individuals,...

Chief Risk Officer

The role of the Chief Risk Officer is to directly assess and holistically manage all aspects of risk brought to bear on the enterprise by IT security and...

Security Policy Implementation Tool

In most cases, using a phased implementation approach for Security Policy allows enterprises to begin to reap policy benefits quickly without causing the massive culture...

Integrate Consumer Applications

This video introduces the key driver of personal and unmanaged applications (PUAs) and the potential long term application portfolio strategy to integrate these into the...

Top 10 Technology Predictions for 2012

It is suddenly that time of year again: time to review past predictions, rank them, and create a new set, in the hope that, by being reasonably accurate, they will assist...

Special Letter: Solving the Greatest Enterprise Security Threat

About five years ago, Ray Ozzie, then newly anointed chief software architect at Microsoft, described the world he saw, from a security perspective, and the vision was...

Special Alert: IP Protection Warning

We have now been warning members of the dangers of a cyber attack on their corporate Intellectual Property for several years. We think the current level of threat has...

Economic Cyberwar: The New Security Mandate

In order to fully appreciate our concept of "Economic Cyberwar," one should start with the idea that the form of war preferred by mercantilist states is not militarist, but...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us