Blog Archives | Page 36

Wednesday, March 28, 2007 23:03 PM

Contractor Jobs Are Jumping

The way the IT job market looks, becoming a contractor might indeed be the way to go. I've mentioned this kind of career transition before, in the context of what it takes to make the switch from full-time....

Thursday, March 22, 2007 16:03 PM

Oracle Sues SAP For A Big Corporate Theft

Oracle filed a complaint against SAP on March 22 in U.S. District Court in San Francisco, alleging "corporate theft on a grand scale." Oracle claims SAP conducted a sweep of materials on Oracle's password-....

Tuesday, March 20, 2007 15:03 PM

Chicken Little, Redux

Good comments to my glib entry on people making too much of potential daylight-saving time computing disasters. I do see the point that when I.T. goes right, people don't notice -- or appreciate it properl....

Sunday, March 18, 2007 20:03 PM

Shadowserver: Most Cyberattacks Are Coming From the U.S. And Europe

The organization has mapped geographically its statistics on drones, botnets and cyberattacks.

Tuesday, March 13, 2007 10:03 AM

Chicken Little and Daylight-Saving Time

It's March 13. We pushed our clocks ahead an hour on March 10 (well, some of us forgot and were subsequently an hour late for Bridge to Terabithia on March 11). But did anything catastrophic happen to our ....

Monday, March 12, 2007 11:03 AM

Businesses That Lose Customer Data May Have To Cover The Costs

Identity theft keeps growing, according to a survey released last week by Gartner, despite businesses' best efforts (or not) to secure their systems. At least 15 million Americans are now victims of iden....

Wednesday, March 07, 2007 21:03 PM

Failure Repeats Itself

We all know why projects fail, right? The people involved don't communicate well enough. No one's come up with a backup plan for when things go wrong. The goals are glorious, but the means to reach them....

Wednesday, February 28, 2007 18:02 PM

More Tools To Plug Security Holes

One thing that landed on the cutting room floor in our story on "5 Big Security Holes" is a reference to free tools to detect flaws in deployments of Voice Over Internet Protocol, the technology that sends....

Friday, February 23, 2007 11:02 AM

Behind The Shabby Treatment Of Wounded Veterans: Information Systems

Don't miss the Washington Post's series this week on veterans who were wounded in Iraq and are now languishing as outpatients at Walter Reed Army Medical Center. Two of the best journalists working today-....

Sunday, February 18, 2007 20:02 PM

An Easy Way To Hunt For Software Bugs

Here's a handy, free tool to expose some of the insecure software applications on your PC, so you can root them out--Software Inspector, from the Danish vendor Secunia, which you can download here. I ran ....

Sunday, February 18, 2007 19:02 PM

New Site, And Where To Find The Archives

Welcome to the new Baseline Security website. Ziff Davis got us new software. The old postings, in case you're interested, are here.

Thursday, February 15, 2007 21:02 PM

Stop the Empty Assurances about Stolen Data

I've been talking about data breaches (who hasn't, especially since the TJX incident). But there's also Anthem Blue Cross Blue Shield's stolen backup tapes, computers stolen from Towers Perrin, KeyCorp and....

Tuesday, February 06, 2007 21:02 PM

VA Data Breached Again -- Enough Already

Not again. More data is missing from the VA. On Feb. 2, the U.S. Department of Veterans Affairs announced that a portable hard drive was reported missing from its Birmingham, Ala., office on Jan. 22. Over ....