News & Commentary
Content tagged with IT Strategy posted in February 2008
Don't Discount The Threat Of Web 2.0 Terror
Commentary  |  2/28/2008  | 
We've recently seen silly articles hyping the threat of terrorists using virtual worlds and other Web 2.0 sites for recruitment, planning, and training. And we've seen equally silly articles ridiculing the idea. The truth is that Web 2.0 tools are great for terrorism, for the same reasons they're great for legitimate projects. That doesn't mean we should shut down Facebook and Second Life to protect ourselves from instant, horrible death. But we do need to rationally evaluate possible threats.
If We're Headed Into A Recession, What Will Happen To IT?
Commentary  |  2/26/2008  | 
IT budgets and tech staffs were clobbered during the recession of the early 2000s. But how would they survive this time around? Hasn't most of the "fat" already been slashed, or has much of it returned?
India Outsourcing Industry Chief Faces Criminal Prosecution
Commentary  |  2/21/2008  | 
Nasscom, which just wrapped up an annual conference that drew thousands of people worldwide to Mumbai, has been hit with a nasty blow. Its president faces prosecution for allegedly failing to ensure the safety of a Hewlett-Packard nighttime call-center employee prior to her murder.
Symantec Offers SMB Storage And Backup Services
Commentary  |  2/19/2008  | 
As today's bMighty ANTenna points out, security giant Symantec is making a move into small and midsize business services. Its first salvos: hosted backup and online storage.
Study Finds Outsourcing Delivers ROI, But Not Innovation
News  |  2/15/2008  | 
Those dissatisfied with outsourcing deals cited high costs, poor communications, and underestimating the project's scope.
Open-Source Security: Trust, But Verify
Commentary  |  2/13/2008  | 
Is open-source software more secure than proprietary software? There may be just one company on the planet that can answer that question, and they aren't talking. What they can tell us, however, may be just as interesting -- and perhaps even more disturbing.
SecureWorks: Attacks Against Healthcare Up 85%
News  |  2/13/2008  | 
Personal, identifiable information, health insurance credentials, and financial data targeted by hackers
Baby Boomer 'Brain Drain' Will Be A Slow Leak
Commentary  |  2/11/2008  | 
Even before the first wave of baby boomers began reaching retirement age, predictions of an impending brain drain looked pretty dire. About 50% of the federal government's workforce was expected to retire over the next few years. Now, it looks like many of those people will be staying put longer.
IC3: Valentine's Day Card is Storm
News  |  2/11/2008  | 
With Valentine's Day approaching, IC3 warns about spam emails spreading the Storm Worm malicious software
Securites Industry Next Target of Online Fraud
News  |  2/11/2008  | 
Securities and brokerage survey shows firms take page from banks in fight against online fraud and identity theft
IT And Legal: Best Friends Forever
Commentary  |  2/7/2008  | 
If your IT department isn't pals with legal, now's the time to strike up a friendship. Both departments must work together to produce e-mail and files related to litigation, otherwise known as e-discovery.
Study: EU Should Serve as 'Clearing House'
News  |  2/6/2008  | 
How to best alert European SMEs and citizens of cyber attacks?
WVU Partners With FBI on Biometrics
News  |  2/6/2008  | 
West Virginia University named national leader for FBI biometrics research
IBM To Open Two More Offshore Development Centers In India
News  |  2/5/2008  | 
Yet IBM isn't immune from a talent war that has raised questions about skill levels of employed engineers in India.
Memento Adds ACH Security
News  |  2/5/2008  | 
Memento helps protect banks from emerging ACH fraud threats
Codenomicon Names Schmidt & Klein to Board
News  |  2/5/2008  | 
R&H's Howard A. Schmidt and Wind River's Ken Klein strengthen board's security software knowledge
Webroot Launches Parental Controls Product
News  |  2/4/2008  | 
Partnership with Boys & Girls Clubs of America helps to protect thousands of children online


Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of December 14, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.