(Go: >> BACK << -|- >> HOME <<)

Computerworld
Quick Menu
Search



Ads by TechWords

See your link here


Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Security: Issues & Trends
Finance
Security
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.

LG, Samsung under investigation for Kodak patent infringement
The U.S. International Trade Comission is investigating a complaint by Kodak charging LG and Samsung with patent infringement. Read more...

Judge denies most SAP motions to dismiss in Oracle suit

Danish IT fugitive Stein Bagger tells tabloid he embezzled after armed threats

Cisco sued for copyright infringement over Linksys router

Obama administration to inherit a real mess on Real ID

Restored DVD key to conviction in rape case

Sony BMG to pay $1M to FTC for COPPA violations

Apple code crashes, locks up Mac clones, Psystar claims

IT fugitive Stein Bagger will be sent back to Denmark

A brief tour of the software pirate underground scene

More Standards and Legal Issues StoriesMore Top Stories

Opinion: Red Flag Rules' Nov. 1 deadline postponed
The recent Wall Street meltdown sparked an outcry for new regulations to prevent another financial crisis. Congress is having hearings to lay the groundwork for a massive new set of laws, but most companies are woefully unprepared to meet any new e-discovery requirements.

Q&A;: Exchanging e-mails with a pirate
After a link to grisly photos of a child murder appeared on The Pirate Bay, the site -- known for letting users share files via the BitTorrent peer-to-peer protocol -- was embroiled in another controversy. Here IDG News Service interviews one of the site's founders about the controversy, an upcoming conference and BitTorrent file sharing in general.

Usenet: Not dead yet
Usenet, a source of community and file exchange for many long-term users, is now being targeted by some of the major ISPs. Is it on its last legs?

FAQ: Is your county posting your Social Security number online?
County and state Web sites may harbor Social Security numbers and other personal data in broadly accessible public records. Here's what you should know.

Mass. transit authority flaw disclosure: A student speaks up
One of three students involved explains the surprise he and his peers felt over the transit authority's response, why he thinks the flaw exposure was necessary and what the lesson is for future researchers.

The key to data security: Separation of duties
Separation of duties is a key control in finance, and it should be required in information security, too. It requires that no one person is able to compromise information.

Wi-Fi Warfare
Find unauthorized Wi-Fi access points on your network and secure them ASAP, warns Frank Hayes.

Norton Internet Security 2009 beta hits the accelerator
NIS 2009 has undergone a major overhaul in an attempt to reduce memory usage, enhance performance and provide a new level of safety.

How Secure is Secure Enough?
With a faltering economy beginning to put the squeeze on IT budgets, and security managers being asked to justify every dollar they spend, there is a growing need to come up with a better answer to the big question in security. Here are five steps for determining how secure is secure enough for your company.

Surveillance camera identifies people by race
An art project by a mechanical engineer with an art degree illustrates a disquieting possibility for surveillance cameras: The ability to make judgments concerning the race of those passing before it.

You can get lean and fast computing with your current version of Mac OS X. Here's how.
Some technology executives don't simply defy convention; they craft a whole new definition of leadership. Learn how the Premier 100 class of 2009 is blazing new management trails.
Apple's new display is more than a gorgeous 24-in. monitor; it's a de facto docking station.
We've got an array of economical, expensive, and just plain weird tech gifts for your friends and family.
Get the latest news, reviews and more about Microsoft's newest desktop operating system
Find wage data for 50 IT job titles.
Securing and Managing the Endpoints: The Case for Convergence
(Source: Symantec) To achieve best-in-class results, convergence of security, compliance and cost-effective management of endpoint systems is vital but not a means to an end. If your current levels of investment in security and compliance have gotten out of balance, taxing your IT resources and effectively your organizations ability to deliver new products and services, then you need to read this white paper.
More White Papers More White Papers
E-mail Address:
(Required)
 Security
 Networking Security
 Virus and Vulnerability Roundup
 Security: Issues and Trends
 Infrastructure & Control
"Privacy groups have long worried about Google's privacy policies --- and now it appears that consumers have followed suit. Google..." Read more Read More Blogs

"When all the terminals at this company suddenly stop responding, this pilot fish soon finds the problem's cause -- and..." Read more Read More Blogs

"The defunct McCain-Palin campaign is selling off the assets, and an investigative journalist from a FOX affiliate was able to..." Read more Read More Blogs

More Security Blogs More Security Blogs
See all Computerworld Blogs See all Computerworld Blogs
White Papers
Virtualizing Microsoft Exchange
In September 2008, Computerworld invited IT and business leaders to participate in a survey on virtualizing Microsoft Exchange. The survey was fielded via targeted broadcasts to Computerworld customers, as well as through an invitation on Computerworld.com. The goal of the survey was to understand initiatives surrounding virtualizing Microsoft Exchange. The survey was commissioned by NetApp, but the data was gathered and tabulated independently by Computerworld Research. The following report represents top-line results of that survey.
Download now! 
Featured Column
The Spy FilesThe Spy Files
For Congress to do anything that helps protect consumers and the critical Internet infrastructure as a whole, it must pass laws that require proactive processes to protect computers, not that tell people how to deal with the resulting mess, says Ira Winkler.

Click here to read the latest column by Ira Winkler
Advances in SSL and Certificate Management
Advances in SSL and Certificate Management
View this webcast now!
Go to the webcast 
Fixing Security Blind Spots
Download this exclusive Computerworld Tech Briefing, free, for a limited time only! Compliments of PacketMotion.
(Source: Computerworld) Blind spots are bad for drivers and potentially disastrous for IT security professionals and the companies they are supposed to protect. As often as not, these security blind spots involve internal employees and third parties with network access.

Learn how to resolve this problem with insider threats in this brand new Computerworld Tech Briefing, available for a limited time only!

Download this executive briefing download
Creating a green data center to help reduce energy costs and gain a competitive advantage
Download this new white paper today!
(Source: VMware) With today's rapid IT growth, companies are looking to consolidate datacenter operations to achieve space and cost savings. And as energy costs continue to rise, datacenter efficiency becomes even more important. This IBM report details how companies are reducing energy usage and costs to gain a completive advantage.
Download this white paper go
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
The Total Economic Impact of the Altiris Total Management Suite Software
Go Green with IBM System x Servers and Intel Xeon Processors
Creating a green data center to help reduce energy costs and gain a competitive advantage
View more whitepapers 
Featured Column
In SecurityIn Security
Stripping away the trappings of applications, systems and networks, information is the core asset of most organizations. Our columnist describes how asserting the importance of information governance is crucial to making that asset tangible, addressable and protected.

Click here to read the latest column by Jon Espenschied
Premier 100
For more information or to register, please visit premier100.com.

Storage Networking World (SNW)
For more information or to register, please visit snwusa.com.

Mobile & Wireless World (MWW)
For more information or to register, please visit mwwusa.com.

Infrastructure Management World (IMW)
For more information or to register, please visit imworldusa.com.

Business Intelligence Perspectives
For more information or to register, please visit biperspectives.com.

IT Executive Summits
For more information or to register, please visit itexecutivesummit.com.
See all events see all events