Articles Related to security architecture

Tis the season to be careful – Malware attacks show seasonal peaks

At a Cyber Security conference in Calgary, held by IQPC with CSO Digital and IT World Canada as media sponsor, Scott Stevens, Vice President...

RIM says it can’t provide e-mail interception in India

India wants RIM to provide a way for it to intercept communications sent via BlackBerry's enterprise server, but the company insists there's no master keys or back doors to get around the encryption

Security concerns hinder mobile deployment

Secutiry concerns are the biggest obstacle to the widespread adoption of wireless and remote computing in businesses worldwide today, according to a global survey by the Economist Intelligence Unit and sponsored by Symantec Corp.

Building a better business case

Choosing her words carefully, Nina Burgess describes her employer, Fortune 500 financial company Comerica Inc., as "very intentional." By that, she means it's a company with lots of process and a deliberate decision-making model. If you want to spend the company's cash, you'd better have your business case down cold. That's because you'll have to make your pitch to the Strategic Investment Committee, an august body of top-level leadership that generally meets every four months to scrutinize every major investment proposal. The company has a multi-step process for ensuring that the business case presented for each project is truly accurate.

Nortel puts focus on network security

As part of its effort to stop a continuing revenue slide, Nortel Networks Corp. last week launched two IT infrastructure security products that are part of a wider network security architecture detailed by the company.

Nortel puts focus on network security

As part of its effort to stop a continuing revenue slide, Nortel Networks Corp. last week launched two IT infrastructure security products that are part of a wider network security architecture detailed by the company.

Eradicating bad e-haviour

Melissa, I Love You, Code Red, Nimda

Eradicating bad e-haviour

A few basic policies and training procedures about network virus threats can be a simple, cheap and surprisingly effective solution to many human-error types of security breaches, according to experts.

Stay on op - Ge the daily news in your inbox