The recession's many corporate pressures didn't have any impact on the Sarbanes-Oxley compliance work of finance and audit executives, according to <a href="http://www.protiviti.com/soxsurvey">research by the internal audit and consulting firm Protiviti</a>.
Roy Harris |
22 Jun |
Read more
The English language is a fluid thing interpreted differently by speakers from different lands. Its beauty is its flexibility: bad or broken English can be just as effective at communicating as fluent English.
Stefan Hammond |
22 Jun |
Read more
U.K. police arrested a 19-year-old on Monday for allegedly attacking a police website earlier in the day, in what is the first arrest connected with the rogue hacking group Lulz Security.
Jeremy Kirk |
21 Jun |
Read more
You can't survive without them. They wield enormous power over your systems, networks, and data -- the very lifeblood of your organization. Few people outside IT have any understanding of what they do, and fewer still exercise any oversight over their actions.
Dan Tynan |
21 Jun |
Read more
Information security company Bridge Point Communications will take over the assets and staff of data centre specialist, Server Central, on 30 June once due diligence is completed.
Hamish Barwick |
21 Jun |
Read more
For the 18th year in a row, Computerworld conducted a survey to identify the 100 best places to work for IT professionals. We started accepting nominations in August 2010.
Computerworld (US) staff |
21 Jun |
Read more
<strong>What's most important about your job?</strong>
Computerworld (US) staff |
21 Jun |
Read more
A day after a pair of hacker groups promised to step up their attacks against government Web sites, one of them claimed to have knocked the U.K.'s Serious Organised Crime Agency (SOCA) offline.
Gregg Keizer |
21 Jun |
Read more
Countries will continue to press the envelope to determine how much damage can be inflicted before the United States declares a cyberwar according to a Federal Bureau of Investigation (FBI) associate.
Hamish Barwick |
20 Jun |
Read more
Compliance is a natural extension of a vulnerability analysis tool. Normal vulnerability scanning includes searching for unpatched systems, unprotected directories and other errors in configuration.
Joel Snyder |
20 Jun |
Read more
We developed a test methodology and evaluation criteria in six main areas, including results reporting, product controls and manageability, scan results, vulnerability workflow features, interoperability, and updates and protocol support.
Joel Snyder |
20 Jun |
Read more
A new U.S. military program shares classified information about <a href="http://www.networkworld.com/news/2011/061411-despite-years-of-talk-utilities.html?hpg1=bn">cyber threats</a> with defense contractors and their ISPs as part of a stepped up effort to blunt potential cyber attacks, a Department of Defense official announced on Thursday.
Tim Greene |
17 Jun |
Read more
Malaysia's Communications and Multimedia Commission said that 51 websites in the .gov.my domain were attacked beginning late Wednesday, and that 41 of the sites suffered various levels of disruption.
John Ribeiro |
16 Jun |
Read more
As more people create Facebook profiles (500 million and growing), and sign on to the many social media sites available today, hiring managers are finding they have new opportunities to get background information on job candidates.
Joan Goodchild |
16 Jun |
Read more
Minnesota Sen. Al Franken is one of most vocal politicians in Washington when it comes to the issue of mobile privacy. In April, he sent letters to both Apple and Google asking if and how they collect location data on their users.
Ed Oswald |
16 Jun |
Read more
Enterprises got some much needed clarification on the implementation of PCI requirements in virtualized environments on Tuesday.
Jaikumar Vijayan |
15 Jun |
Read more
Astaro nabs SonicWALL staff while TechnologyOne hires higher education expert
Computerworld Staff |
14 Jun |
Read more
Why is it such a struggle to work in security? Show me a security professional who
hasn’t felt misunderstood and undervalued. Who hasn’t complained that they are treated like a pariah?
What are we missing? Is it our fault or is the world not ready for us yet? Does a major
security breach have to happen before the penny drops?
CSO staff |
14 Jun |
Read more
The International Monetary Fund has reportedly been hit with a "large and sophisticated cyberattack" that potentially puts sensitive, confidential data about national economies at risk of exposure.
James Niccolai |
12 Jun |
Read more
Security experts have criticized the European Commission's plans to set up a team to look at how to combat cyberattacks as too little, too late, saying that more coordination between member states is needed.
Jennifer Baker |
11 Jun |
Read more