The key to turning your company’s conformity with Sarbanes-Oxley into a strategic advantage is to sustain your compliance year-on-year. To do so, you must embrace the idea that Sarbanes-Oxley compliance is an ongoing journey not a final destination.
Instant messaging (IM) has triumphed in the past 2-3 years among personal Internet users as well as within companies. There are now few school children not in touch with their friends via ICQ, MSN or AOL Messenger — but also stockbrokers, currency dealers, and the IT department are constantly ‘chatting’” with their most important contacts… Read More »
Former Hewlett-Packard chief executive Carly Fiorina joins the board of directors of the information security company Cybertrust. The Virginia-based company provides outsourcing and technological services that address vulnerability management, compliance and identity management.
The growth in mobile data usage would result if device manufactures embed security applications in devices, says new survey, reflecting wireless user’s concern about the security of mobile devices and protection of data.
The coalition of anti-spyware vendors published on Thursday spyware protection guidelines to help consumers protect themselves against various malicious programs. The alliance has also updated the definitions of spyware and adware programs.
New Members Include Cable & Wireless and XS4ALL, among Others
SAN DIEGO, Oct. 25 Nortel Toronto and Websense, Inc. have signed an agreement to develop a web content filtering solution to protect GSM/UMTS mobile handsets from receiving and accessing unwanted content.
As information security becomes increasingly important to the continued success of businesses, many are seeking an appropriate security framework. The ISO 17799 standard is widely becoming the choice for many.
Capacity for a further three million subscribers ordered from technology partner Celltick as demand for Chameleon soars
Spear phishing attacks are the latest technique used by computer hackers to gain access to secure enterprise networks. Unlike common phishing attacks which target millions of users, spear phishing attack is focused on one end-user or an organization at a time, and typically asks for login IDs and passwords.