Content tagged with IT Strategy - posted in February 2008 - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Content tagged with IT Strategy
posted in February 2008
Don't Discount The Threat Of Web 2.0 Terror
Commentary  |  2/28/2008
We've recently seen silly articles hyping the threat of terrorists using virtual worlds and other Web 2.0 sites for recruitment, planning, and training. And we've seen equally silly articles ridiculing the idea. The truth is that Web 2.0 tools are great for terrorism, for the same reasons they're great for legitimate projects. That doesn't mean we should shut down Facebook and Second Life to protect ourselves from instant, horrible death. But we do need to rationally evaluate possible threats.
If We're Headed Into A Recession, What Will Happen To IT?
Commentary  |  2/26/2008
IT budgets and tech staffs were clobbered during the recession of the early 2000s. But how would they survive this time around? Hasn't most of the "fat" already been slashed, or has much of it returned?
India Outsourcing Industry Chief Faces Criminal Prosecution
Commentary  |  2/21/2008
Nasscom, which just wrapped up an annual conference that drew thousands of people worldwide to Mumbai, has been hit with a nasty blow. Its president faces prosecution for allegedly failing to ensure the safety of a Hewlett-Packard nighttime call-center employee prior to her murder.
Symantec Offers SMB Storage And Backup Services
Commentary  |  2/19/2008
As today's bMighty ANTenna points out, security giant Symantec is making a move into small and midsize business services. Its first salvos: hosted backup and online storage.
Study Finds Outsourcing Delivers ROI, But Not Innovation
News  |  2/15/2008
Those dissatisfied with outsourcing deals cited high costs, poor communications, and underestimating the project's scope.
Open-Source Security: Trust, But Verify
Commentary  |  2/13/2008
Is open-source software more secure than proprietary software? There may be just one company on the planet that can answer that question, and they aren't talking. What they can tell us, however, may be just as interesting -- and perhaps even more disturbing.
SecureWorks: Attacks Against Healthcare Up 85%
News  |  2/13/2008
Personal, identifiable information, health insurance credentials, and financial data targeted by hackers
Baby Boomer 'Brain Drain' Will Be A Slow Leak
Commentary  |  2/11/2008
Even before the first wave of baby boomers began reaching retirement age, predictions of an impending brain drain looked pretty dire. About 50% of the federal government's workforce was expected to retire over the next few years. Now, it looks like many of those people will be staying put longer.
IC3: Valentine's Day Card is Storm
News  |  2/11/2008
With Valentine's Day approaching, IC3 warns about spam emails spreading the Storm Worm malicious software
Securites Industry Next Target of Online Fraud
News  |  2/11/2008
Securities and brokerage survey shows firms take page from banks in fight against online fraud and identity theft
IT And Legal: Best Friends Forever
Commentary  |  2/7/2008
If your IT department isn't pals with legal, now's the time to strike up a friendship. Both departments must work together to produce e-mail and files related to litigation, otherwise known as e-discovery.
IM Security Threats: How to Protect Your Business
Features  |  2/6/2008
Instant Messaging has become an effective business tool. But its increasing popularity means that it too is now more vulnerable to attack
Study: EU Should Serve as 'Clearing House'
News  |  2/6/2008
How to best alert European SMEs and citizens of cyber attacks?
WVU Partners With FBI on Biometrics
News  |  2/6/2008
West Virginia University named national leader for FBI biometrics research
IBM To Open Two More Offshore Development Centers In India
News  |  2/5/2008
Yet IBM isn't immune from a talent war that has raised questions about skill levels of employed engineers in India.
Google Bolsters E-mail Security
Commentary  |  2/5/2008
InformationWeek
Memento Adds ACH Security
News  |  2/5/2008
Memento helps protect banks from emerging ACH fraud threats
Codenomicon Names Schmidt & Klein to Board
News  |  2/5/2008
R&H's Howard A. Schmidt and Wind River's Ken Klein strengthen board's security software knowledge
Webroot Launches Parental Controls Product
News  |  2/4/2008
Partnership with Boys & Girls Clubs of America helps to protect thousands of children online


2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Slideshows
Blockchain Gets Real Across Industries
Lisa Morgan, Freelance Writer,  7/22/2021
Commentary
Seeking a Competitive Edge vs. Chasing Savings in the Cloud
Joao-Pierre S. Ruth, Senior Writer,  7/19/2021
News
How CIO Roles Will Change: The Future of Work
Jessica Davis, Senior Editor, Enterprise Apps,  7/1/2021
Register for InformationWeek Newsletters
Video
Current Issue
Monitoring Critical Cloud Workloads Report
In this report, our experts will discuss how to advance your ability to monitor critical workloads as they move about the various cloud platforms in your company.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll