MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 1271-1280 Newer>
InternetNews
February 27, 2004
Jim Wagner
P2P Makes its Business Case Makers of file-sharing software stress convenience and savings, but IT decision-makers fret about losing control of their networks. mark for My Articles 156 similar articles
InternetNews
February 27, 2004
Jim Wagner
IE Frame Exploit Grabs Keystrokes iDefense warns of an exploit that can grab login and password information from Web surfers. mark for My Articles 194 similar articles
InternetNews
February 26, 2004
Michael Singer
The Net Has An 'Insecurity' Complex RSA's second annual assessment of online security leaves little doubt that corporations have a long way to go. mark for My Articles 178 similar articles
InternetNews
February 26, 2004
Sean Michael Kerner
Worms Continue to Wriggle, Wreak Havoc 'Zero-day' exploits and new styles of viruses send security firms scrambling to patch the latest holes in the network. mark for My Articles 327 similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles 101 similar articles
PC Magazine
March 16, 2004
Leon Erlanger
Five Tricks Hackers Use on You 5 tricks to what out for that hackers use to access your system. mark for My Articles 69 similar articles
PC Magazine
March 16, 2004
Leon Erlanger
Hacked in a Flash Tiny USB drives offer unparalleled convenience to all sorts of users--including data thieves. mark for My Articles 567 similar articles
PC Magazine
March 16, 2004
The Lookout: VoIP Vulnerable Applications such as Voice over IP telephony and videoconferencing could be vulnerable to security breaches because of flaws in the way a major telephony standard is being used. mark for My Articles 139 similar articles
InternetNews
February 25, 2004
Susan Kuchinskas
WS-I: Best Security Practices for Web Services Industry group's working draft is another advance toward interoperability on secure messaging techniques. The draft document identifies security challenges and threats to security with Web services and outlines best practices for dealing with them. mark for My Articles 26 similar articles
The Motley Fool
February 25, 2004
Alyce Lomax
Microsoft's Homeland Security Microsoft at a security conference yesterday addressed security concerns by discussing a string of "active protection" initiatives to make its products safer. It makes sense that all eyes would be on the technology giant's security plans, considering its recent rep as needing a security boost. mark for My Articles 61 similar articles
<Older 1271-1280 Newer>    Return to current articles.