Two separate security surveys this week on network access control reach similar conclusions: Employees have immoderate access rights, and management should face up to the challenge of reining in out-of-control access without sacrificing productivity gains.
Ellen Messmer |
07 Feb |
Read more
The Westpac Banking Corporation is creating a Virtual Enterprise Resource Directory to manage and automate access control while ensuring information is made available on a "need to know" basis.
Sandra Rossi |
20 Aug |
Read more
NICTA principal scientist Dr Renato Iannella will co-chair a new World Wide Web Consortium (W3C) Interest Group to lead discussions addressing Web user privacy issues.
Sandra Rossi |
23 Oct |
Read more
The marriage of <a href="http://www.sonicwall.com/" target="_blank">SonicWall</a> and <a href="http://www.aventail.com/" target="_blank">Aventail</a> could result in a new network access control (NAC) vendor after the companies have the chance to assess and integrate their respective technologies.
Tim Greene |
15 Jun |
Read more
The world renowned Australia Zoo on Queensland's Sunshine Coast hinterland has installed a 3D facial recognition system.
Sandra Rossi |
23 Aug |
Read more
Google believes that its consumer-grade Web applications represent the future of enterprise IT. But while Google is quick to trumpet its products' innovative features, the search giant hasn't said much about their security. Until recently, that is.
Robert McMillan |
12 Jul |
Read more
Users of online banking sites tend to bypass critical clues that the integrity of those sites may have been compromised, according to the working draft of a study released on Sunday by researchers at Harvard University and the Massachusetts Institute of Technology.
Jeremy Kirk |
06 Feb |
Read more
In 1996, William Beaumont Hospital, a 254-bed community hospital in Michigan, had a problem: A small number of rogue employees were taking narcotics from a storage area without authorization.
Juan Carlos Perez |
25 Jul |
Read more
Clear text messages used in transferring applications via Web services can potentially slip through existing security hardware allowing malformed code to run rampant within organizations.
Michael Crawford |
22 Feb |
Read more