Science Applications Int’l Corp.: Looking for Lapses
Where are the weak spots in your organization’s security perimeter? Is there a black market in your company’s access key-cards? Is your backup data center
Where are the weak spots in your organization’s security perimeter? Is there a black market in your company’s access key-cards? Is your backup data center
I was in charge of technology at Conoco when PCs first came outand PCs weren’t very good. But they enabled technology to proliferate much faster
Security is again blowing a hole into Microsoft’s relationships with its customersboth individual and corporate. The Blaster worm and its siblings took down many corporate
Dear President Bush: You probably don’t know Joel Phagoo. He is a 21-year-old college student who decided to go fishing in New York’s Jamaica Bay
Did you know that:The main problem is sharing, at all Security and government regulations are driving law enforcement and intelligence agencies to share sensitive information
Gobble up everything in sight, and you may get indigestion. Parent company Tyco International was already collecting security firms when it bought ADT in 1998and
Traditional video-security systems are known as closed-circuit television (CCTV) for a good reason: These workhorses of perimeter security typically use dedicated coaxial cable to carry
Darwin John had established himself as a bit of a miracle worker before being asked to lead an information- systems renaissance at the Federal Bureau
Verizon’s phone cables were crushed and submerged in water after 7 World Trade Center crashed. Finally, its rehabilitation work is just about complete. By the