Nothing new is really going down in information security right now. At least that’s the take of some of SC’s Editorial Advisory Board members. There ...
Breach law signed in N.Y.
IT security will get a bigger piece of the fiduciary pie in 2006
What is it? DRM stands for Digital Rights Management, describing any number of methods that content providers enlist to try to exercise control over what you ...
Sun Microsystems and Dartmouth College have announced a collaboration to increase security features in the college’s OpenSolaris project. Dartmouth will also develop a graduate-level operating system ...
The monitoring systems of power plants and other industrial installments will become better defended against internet-based threats in coming years, one leading security analyst has ...
What does your job entail? Anything involving the network – basically making sure people get the information they are looking for. We have 400 restaurants and ...
I just attended the Computer Security Institue’s 32nd Annual Conference and this year there were rumblings on the show floor about the lack of anything ...
A mix of regulatory requirements coupled with front-page news stories regarding security breaches worldwide have unveiled an array of application security issues.
I had the pleasure of attending a session with a "guturist" recently — a gentleman by the name of Michael Tchong. He spends much of ...
<p>Outsourcing option</p> <p>Unilever confirmed last month that it is discussing outsourcing parts of its finance, human resources and IT operations to Accenture and IBM. An ...
Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Three IT security pros explain that a reliable network is key, no matter the size of the company.
Just one lone publicly disclosed identity theft incident can make even the largest enterprise beef up information security and privacy practices fast.
One day, you are the IT security pro for a tidy, small company with about 700 PCs on your mind. The next day, more than ...
Smaller enterprises, companies with about 500 or fewer employees, have little of the luxuries that their larger counterparts boast. Although short on staff, resources and ...
Jill Cherveny-Keough never lowers her defenses. When she receives unsolicited email from an unknown source, Cherveny-Keough assumes it contains a worm, virus or verbiage that ...
SC Magazine U.S. Awards dinner is edging closer.
When truth is stranger than fiction — as it often is in enterprise IT departments — managing technology assets securely can require a powerful imagination. ...
In the last few months, it has become nearly impossible to read a magazine or watch television without coming across a story about identity theft. ...