News & Commentary
Content tagged with IT Strategy posted in January 2008
Where's Your Credit Card Data?
Commentary  |  1/30/2008  | 
PCI regulations require companies to protect credit card numbers. But first you have to know where they are. Here's what I've learned from retailers and PCI auditors about step one of PCI compliance.
What Matters Most About Your Job In Uncertain Times?
Commentary  |  1/30/2008  | 
Do you expect your paycheck to grow much fatter this year? Maybe you're just glad you get a paycheck, especially with all the gloom and doom about the economy. If that's the case, then maybe other job traits or perks -- besides money -- are moving higher up on your priority list right now when it comes to work.
Mandiant Unveils Appliance
News  |  1/27/2008  | 
Mandiant launches industry's 1st enterprise-grade incident response solution at Demo 08
Leaky Nuke Lab Is Poor Endorsement For A Security Product
Commentary  |  1/23/2008  | 
A new startup has licensed technology from Los Alamos National Laboratory to help enterprises respond to security incidents. But does the company really want to be associated with a lab that routinely mishandles nuclear weapons secrets?
ID Theft Scoring Firm Launches Service
News  |  1/23/2008  | 
Comprehensive package of identity scoring, credit management and credit freezing ensures proactive identity theft protection
LAN Gaming Picks IdentiPHI
News  |  1/22/2008  | 
LAN Gaming selects IdentiPHI SAFsolutionR for biometric-based user authentication and parental controls
iovation Provides Safer Online Dating
News  |  1/22/2008  | 
iovation provides safer online environment for iDating community; fraud management solution helps Mobeze save 40% in operating costs
IC3 Says Vishing Attacks on the Rise
News  |  1/18/2008  | 
The IC3 has received multiple reports on different variations of 'vishing'
Absolute Recovers 5,000th Stolen Computer
News  |  1/15/2008  | 
Computer security pioneer highlights major corporate milestone and latest recovery stories
Giving Active Directory The Finger
Commentary  |  1/12/2008  | 
Do you know who has permission to reset passwords, create accounts, and elevate permissions in your organization? Sanjay Tandon, a former Microsoft program manager of Active Directory, bets the answer will surprise -- and dismay -- your security and compliance officers.
Botnets: Computer Crime's Service Providers
News  |  1/11/2008  | 
Looking for a platform from which to launch your next exploit? Botnets have the network for you
Clinton And McCain On Globalization, Technology
Commentary  |  1/10/2008  | 
The morning after the Iowa caucus results, I shared with you what Mike Huckabee and Barack Obama are saying about technology and globalization. The focus has shifted over to Hillary Clinton and John McCain after the results in New Hampshire's primary. Here's what those presidential candidates have to say about those topics.
Are Young Techies Spoiled Brats?
Commentary  |  1/10/2008  | 
Who has pickier job expectations, young people entering the tech field, or the employers who hire them? A new report released today says tech executives think millennials -- people between the ages of 18 and 31 -- are too fussy about pay and perks, and are the most difficult to manage.
Mandiant to Present at DOD Conference
News  |  1/10/2008  | 
Mandiant's Wendi Whitmore and Chuck Willis to present at US Department of Defense Cyber Crime Conference 2008
Oops, Look At That Phoenix, Rising From The Ashes
Commentary  |  1/9/2008  | 
In a story headlined, Open Source Code Contains Security Holes, I referred recently to the Firebird database project as "somewhat moribund." So imagine my surprise when a reader pointed out it was named project of the month in December by SourceForge, the dominant host of open source projects. Geez. Then there was the case of the supposedly "inactive" FreeBSD Unix.
Is Tech Talent Getting Harder To Find?
Commentary  |  1/9/2008  | 
There were almost 300,000 new IT jobs last year, according to the latest figures from the Bureau of Labor Statistics. And that doesn't surprise Bob Keefe, new president of the Society for Information Management. He says talent issues are the top challenge these days for his fellow CIOs.
Aberdeen-Arcot Reports on 2008 Plans
News  |  1/9/2008  | 
New Aberdeen research: Organizations plan to ramp up security technology use to protect customers online in 2008
Fortify Premieres Documentary
News  |  1/9/2008  | 
Documentary, 'The New Face of Cybercrime' highlights impact of cybercrime and how security industry is responding
The Startup Makeover?
Commentary  |  1/8/2008  | 
NAC vendor Vernier Networks is apparently reinventing itself as a startup, despite being founded almost seven years ago. The company will rename itself Autonomic Networks and brand itself a Series A startup. It's an odd strategy, given that the company already has raised at least $35 million through A, B, and C funding rounds.
Huckabee And Obama On Globalization, Technology
Commentary  |  1/4/2008  | 
First off, Huck-a-who? I had to do some research this morning to learn more about the winning Republican candidate at the Iowa caucus. So Mike Huckabee is an ultraconservative and former Baptist preacher. Ohh-kay. But I'll resist the urge to spout out my personal views here and share with you what Huckabee and Democratic winner Barack Obama have to say on the issues of globalization and technology at their Web sites.
What Are Your 2008 Job Predictions?
Commentary  |  1/2/2008  | 
Bad economic news is making techies glum about jobs, even though managers supposedly remain fairly upbeat about IT hiring and spending plans, according to a new report. What does your gut tell you about tech jobs in 2008?
Hackers Launch Holiday Email Campaign
News  |  1/2/2008  | 
Sophos is warning users of a malicious email campaign exploiting the holiday season
Five Offshore Outsourcing Predictions For 2008
Commentary  |  1/1/2008  | 
Plenty of change lies ahead in the area of offshore outsourcing, which has evolved from a little-used practice to a mature industry in less than 10 years. Here are five predictions for offshore outsourcing in 2008:


The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.