One out of every two IT security professionals spends 50% of the work week on regulatory compliance initiatives, according to a new survey sponsored by eEye Digital Security.
The Symbian Foundation, which recently lost its respected executive director and the backing of two major phone makers, is getting a much-needed boost through a European Commission-sponsored project.
Asustek Computer plans to develop an educational robot for kids called the EeeBot that uses software based on Google's Android mobile operating system as part of a project sponsored by the Taiwan government to promote Android.
The mobile world is one step closer to adopting a single standard for voice over Long Term Evolution (LTE) technology now that the GSM Association has adopted the carrier-sponsored 'One Voice' initiative.
On Wednesday, Registrar ICM Registry announced that the dot-XXX sponsored top-level domain (sTLD) for the adult entertainment industry is open for registration.
As part of direct service provision and marketing of Korean online games, the North American Final Round of the Game & Game World Championship 2009 (GNGWC 2009), which is sponsored by the Ministry of Culture, Sports and Tourism (Minister Yu In-chon), managed by the Korea Creative Content Agency (Chairman Li Jae-woong) and financially supported by KT Co., Ltd., was held in Howies' Game Shack at the Buena Park Mall, LA, USA on September 12.
Network security vendors need to cooperate more with each other and with the government to effectively fight cybercriminals, state-sponsored cyberspying and cyber terrorists, the audience crowding the RSA Conference 2009 keynote session was told Tuesday.
Last week in New York I was able to attend a conference sponsored by IBM which was titled "Creating a Smarter Bank with a Competitive Edge". The seminar, aside from being interesting and informative, brought together a combination of financial services executives, capital markets experts, consultants, and industry analysts. I identified three dominant themes for the day:
One of many interesting aspects of this government-sponsored alternative energy systems design project is how IT is used to manage and monitor energy consumption via iPhone apps and Web interfaces.
Facebook calls them "sponsored stories" and LinkedIn calls them "social ads." And you've likely seen them: small modules in the margin of your screen that promote a company or product with information on which of your friends or connections "like" or "follow" that brand.
Social networking is catching on in the enterprise whether IT likes it or not, said IT leaders at Ford, Continental Airlines and Intel during a discussion at a Microsoft-sponsored event.
The security associated with industrial control systems (ICS) is facing heavy criticism this week at the ICS Joint Working Group 2012 Spring Conference, sponsored by the U.S. Department of Homeland Security (DHS). DHS is concerned cyberattacks could disrupt America's energy, water and manufacturing facilities.
The newest release of the Red Hat-sponsored Fedora Linux distribution includes a number of technologies that haven't made their way into Red Hat Enterprise Linux (RHEL) yet, including a new version of the OpenStack cloud platform, code-named Essex, that the company plans to adopt in future editions of its flagship distribution.
During a panel discussion sponsored by the Internet Innovation Alliance today, several experts pondered whether global bandwidth demand could soon outstrip supply.
Third annual study by The Measurement Factory, sponsored by DNS management vendor Infoblox, shares the bad news that many servers remain vulnerable to pharming and other attacks.
The U.S. has the world's best environment for a competitive IT industry, but other countries, including Taiwan, Sweden and Denmark are quickly catching up, according to a new study sponsored by the U.S.-based Business Software Alliance (BSA).
TriCipher’s Ravi Ganesan (he founded the company back at the turn of the century) and the other fine folks at the company recently sponsored a survey conducted by Javelin Strategy & Research, which does research for the payment and financial services industries. The survey was on consumer online banking and the results were published last week, along with the results of follow-up studies.
As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of online security. These seven methods are those most often encountered in a financial services environment, but they would be useful (and adaptable) to just about any area where stronger authentication was needed. Here they are:
Though once a rare topic, today the air is filled with accusations of state-sponsored cyber-espionage and break-ins as the governments of U.S., China, Russia, Israel, India and Iran, among others, can be heard calling foreign cyberattacks a threat. The effect is a powerfully accelerating cyber-nationalism that's driving buildup of cyber-commands and general rancor that may spill over into trade relations.
Network World Brand New Webcasts, available to you 24 hours a day - 7 days a week! Featured Webcast: Compliance does not have to cost more. Automation is the best way to establish trouble-free compliance with regulatory requirements, company rules and network policies. Join Network World in this Webcast sponsored by Invest Northern Ireland to learn how leading companies have eliminated slow, costly, complex engineering processes. Reduce the risk of errors. Save time and money. http://www.networkworld.com/N
Siemens Communications, one of the world’s leading vendors of open communications products for enterprises recently sponsored an IDC study to examine how the enterprise market is combining unified communications, Web 2.0 technologies, and business applications to improve business operations. A white paper that summarizes key findings from the study, titled “Enterprise Communications 2.0: Creating Competitive Advantage,” can be found here.
I recently attended a “community roundtable” sponsored by American InterContinental University entitled “What’s the Future of Houston’s IT Market?” Even though it’s the fourth largest city in the U.S., Houston isn’t exactly known as a hotbed for information technology innovation. Not yet, anyway.
News from the hinterlands still travels slowly. I’ve just gotten word, from Agreon’s Brian Brannigan, of a conference held last December in Brisbane, Australia. Sponsored by the Queensland government as well as Australia’s National Consultative Committee on Security and Risk, the Virtual Opportunity Congress IV on Identity & Access 2006 focused on issues of identity management, access, security and privacy in the online environment. The event brought together over 100 delegates from government, banki
Keeping you informed and keeping you well ahead of the curve - Network World Webcasts - Brand new and right on time! Featured Webcast - sponsored by Voyence:
Consistency in processes and policies across IT Automation and policy enforcement are key in solving configuration and change issues. Tune in and learn how to establish policies for change and configuration that can be used to cross all the domains. Watch this exclusive Webcast now: http://www.accelacomm.com/jlp/nwvy4_wcnl0202/7/10004988/ We hope you
Red Hat and project contributors have released alpha code for Fedora 10, the next version of the community-sponsored, free and open-source Linux distribution that will include enhancements to the audio, security and wireless-connection features of the OS.