So what proof is there that IT security professionals are truly armed with the know-how they may promote?
»Information Consulting Group has acquired project management firm Net Solutions. The merger provides the business consultant organization's customers with IT security management solutions. ICG specializes ...
For, by Nishant Kaushik, architect, security and identity products, Oracle
Security and privacy experts voiced their concerns over whether or not Google’s latest desktop feature is a threat because of a controversial feature that allows ...
Macintosh enthusiasts have long used the security of their systems as a flag to wave in the faces of their Windows-using counterparts. With the recent ...
What do you like about your job?
In our organizations, we need to take a strong lead in many areas. The first area is awareness. There used to be a commercial where ...
It is an old truism that crime goes where the money is. And today, the money is in the data, so that’s where we find ...
Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
At the SC Magazine Forum, you could gain information, advice and great contacts to help you more readily achieve your goals as an IT security ...
SC Magazine is providing an exclusive look at abridged versions of various chapters included in the just-released Larstan’s "The Black Book on Government Security," as ...
Knowing who’s accessing what on enterprise networks that often lack defined perimeters is a necessity. So many company executives are trying to sort out the ...
There's yet another IT security bandwagon onto which any number of vendors are jumping. And, whether companies refer to it as network access management (NAM), ...
As the mastermind of the Bali nightclub bombings awaited execution, he published a jailhouse autobiography teaching others to follow in his footsteps.
If I say the word security to you, what comes to mind? Do you think of the access card keys that allow you into your ...