91ÖÆÆ¬³§

Tagged - security

The Globe and Mail - Plucky David aims a rock at cybersecurity Goliaths

(6-Jan-11) Last year, David Lowenstein, chief executive officer of Toronto-based Federated Networks, told attendees at the Demo technology conference in Santa Clara,...

Special Letter: The Making of the Film "Climate Refugees - The Human Face of Climate Change"

Publisher’s Note: Today, most citizens, and their leaders, around the world are convinced both of climate change and of the human contribution that is increasingly driving...

Globe and Mail - Do iPhones have what it takes?

(22-Nov-10) When Apple launched the iPhone in 2007, information technology experts declared it unsuitable for business use – not least because of security...

Enterprise vs. Consumer

Last week I had a chance to do my second interview with Mark Hurd, recently departed CEO of Hewlett-Packard and now president of Oracle. We covered a great deal of...

91ÖÆÆ¬³§ing an Enterprise IT Security Training Program

Over 50% of security breaches are a result of end-user error, oversight, and ignorance. IT security training is an effective method of reducing end-user related security...

Establishing Training Parameters Template

There are many factors that affect an organization's IT security training needs and goals: environment, specific security threats, and end-user perceptions and knowledge....

IT Security Training Tool

In order to create an effective IT security training program, you must make a series of key decisions based on information gathered during the Establishing Training...

News Analysis - Intel's Acquisition of McAfee Signals a Paradigm Shift in the Security Market Place

Intel Corporation and McAfee, Inc. announced a definitive agreement for Intel to purchase McAfee. The purchase price is currently set at USD$7.68 billion where Intel will...

Special Letter: Moving the Enterprise to the Cloud: Complexity vs. Value

Publisher's Note: A couple of years ago, my Conference panels on the cloud began looking more deeply into Cloud construction, Cloud security, Cloud infrastructure...

Defining Cyberwar

What if they gave a war, and nobody came? It's an old joke. But what if the next war were so different from the last that it was over before the victims even knew a war had...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us