The view from the top of IT with TechWorld Editor Rohan Pearce
Organizations have spent vast sums of money on security systems and, when deployed and operated correctly, they play a key role in safeguarding the organization. However, most systems have one critical dependency: The traffic flowing through must be readable. If the traffic is encrypted, many systems are almost completely useless, giving the system owner a false sense of security.
By Brian Heder | 18 January, 2013 17:15
The University of Melbourne has reported an unexpected side benefit from deploying network security — saving money.
By Hamish Barwick | 29 October, 2012 16:11
Tired of regulators from three or four federal agencies auditing your network security compliance every year? A congressional task force recommends a super-standard that would cut the number of annual audits back to just one.
By Tim Greene | 07 October, 2011 01:30
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
Laptops used to be the only devices on the company's wireless network. But Wi-Fi has become a ubiquitous standard used by a host of devices -- including desktop PCs, laptops, netbooks, tablets, smartphones, printers, storage devices, and projectors.
By Logan G. Harbaugh | 27 October, 2011 08:27
There are more than a few critics of cloud computing, even at PCWorld; I'm probably one of them. But I've been turning over in my mind different perspectives on the cloud. I've tried to set aside the views of the IT executive, who seems to dominate the debate.
By Keir Thomas | 05 February, 2011 11:53
In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, had its funding through PayPal, MasterCard and other sources shut down, and its leader arrested on sexual assault-related charges. The fact that WikiLeaks remains stubbornly and defiantly online holds some lessons for other sites when it comes to resilience and survivability.
By Tony Bradley | 09 December, 2010 07:29
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.