91ÖÆÆ¬³§

Tagged - security

Special Letter: The Making of the Film "Climate Refugees - The Human Face of Climate Change"

Publisher’s Note: Today, most citizens, and their leaders, around the world are convinced both of climate change and of the human contribution that is increasingly driving...

Globe and Mail - Do iPhones have what it takes?

(22-Nov-10) When Apple launched the iPhone in 2007, information technology experts declared it unsuitable for business use – not least because of security...

Enterprise vs. Consumer

Last week I had a chance to do my second interview with Mark Hurd, recently departed CEO of Hewlett-Packard and now president of Oracle. We covered a great deal of...

91ÖÆÆ¬³§ing an Enterprise IT Security Training Program

Over 50% of security breaches are a result of end-user error, oversight, and ignorance. IT security training is an effective method of reducing end-user related security...

Establishing Training Parameters Template

There are many factors that affect an organization's IT security training needs and goals: environment, specific security threats, and end-user perceptions and knowledge....

IT Security Training Tool

In order to create an effective IT security training program, you must make a series of key decisions based on information gathered during the Establishing Training...

News Analysis - Intel's Acquisition of McAfee Signals a Paradigm Shift in the Security Market Place

Intel Corporation and McAfee, Inc. announced a definitive agreement for Intel to purchase McAfee. The purchase price is currently set at USD$7.68 billion where Intel will...

Special Letter: Moving the Enterprise to the Cloud: Complexity vs. Value

Publisher's Note: A couple of years ago, my Conference panels on the cloud began looking more deeply into Cloud construction, Cloud security, Cloud infrastructure...

Defining Cyberwar

What if they gave a war, and nobody came? It's an old joke. But what if the next war were so different from the last that it was over before the victims even knew a war had...

IT Security Manager

The IT Security Manager performs two core functions for the enterprise. The first is overseeing the operations of the enterprise's security solutions through management of...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us