Articles By Deborah Radcliff

Identity management in the real world

Identity management in the real world

BellSouth Corp.'s call centre employees often need to access several applications to answer a single customer service call. Each time...

November 16th, 2004 Deborah Radcliff
U.S. cyber czar warns educators about better security

U.S. cyber czar warns educators about better security

Despite evidence of al-Qaeda's research into American utility companies gleaned from laptops seized after the Sept. 11 terrorist attacks, don't...

June 4th, 2002 Deborah Radcliff
Security under the gun

Security under the gun

After Bruce Lobree, an information security engineer and a 20-year IT veteran, lost his job in October, he decided to...

June 2nd, 2002 Deborah Radcliff
Guarding the gates

Guarding the gates

When bankrupt Exodus Communications Inc. began asset acquisition proceedings with London-based Cable & Wireless PLC in February, Exodus' chief security...

March 31st, 2002 Deborah Radcliff
Slow economy spurs quick degrees

Slow economy spurs quick degrees

Louis Drzewiecki, a senior data analyst at United Healthcare Corp. in Minneapolis, decided three years ago to pursue a master's...

March 10th, 2002 Deborah Radcliff
Hot skills for a cold market

Hot skills for a cold market

About a year ago, Fred Meyer Jewelers began a migration away from the mainframes at its parent company, Fred Meyer...

November 11th, 2001 Deborah Radcliff
Guarding The Data Warehouse Gate

Guarding The Data Warehouse Gate

Rising concerns about privacy mean that the security of sensitive information, such as medical and financial data and information about...

September 30th, 2001 Deborah Radcliff
Researchers say Nimda set to propagate again

Researchers say Nimda set to propagate again

Researchers have discovered a third vector to the Nimda worm, which is set to propagate again through email at 1:00...

September 28th, 2001 Deborah Radcliff
XML Survivors

XML Survivors

About a year ago, Payet Guillermo's systems and Web development work called for more robust capabilities for the sharing of...

September 9th, 2001 Deborah Radcliff
IP insecurity

IP insecurity

Stolen credit card numbers, hacked federal computer systems and other high-profile on-line assaults have put many users on their guards...

May 17th, 2001 Deborah Radcliff