Sponsors
Hosted by Gradwell
Powered by Eclipse
Shop
Compare UK prices
Compare US prices
Sections
Homepage
Reviews
Opinions
Guides
News
Videos
Web news
Competition
Tracking
Top news
Top reviews
Top opinions
Top guides
Editor's Choice
Categories
Apple Mac
Audio
Business
Developer
Design
Digital camera
Gaming
Graphics card
Input device
Internet
Linux
Mobile phone
Monitor
Multimedia
Networking
Operating System
PC Systems
PDA
Printer
Processor
Projector
Scanner
Security
Server
Storage
Tuning
Utilities
Video
Miscellaneous
Admin
About
Contact
Advertise
Disclaimer
Terms
Competition rules
Reader survey
Help us improve
Feeds
RSS
Twitter
 
 
1
2
3
4
5
>
Cyber Warfare: How Secure Are Your Communications?
Almost every week the media reports on negligent loss of data, much of it highly sensitive. Perhaps with so many people using so much data in so many different places we should not be so surprised. Today more and more ...
 
19.02.09
 
Storm Warning: Is It Time To Take The Top Down?
Gartner believes there’s a storm coming. And not just any storm. In a recent Web seminar, the industry analyst stated that numerous factors impacting business and enterprise IT today are creating a ‘perfect storm’ scenario, ...
 
03.02.09
 
The Ultimate Blended Threat: VW Golfs & Baseball Caps
A few days ago I became the innocent victim of a ‘blended threat’ attack when a Volkswagen Golf and a Hyundai Getz joined together and rammed my two week old car sitting in front of my house. Off course as with all blended ...
 
06.01.09
 
Does Web 2.0 Mean Threat 2.0?
All manner of companies are beginning to adopt Web 2.0 technologies, encouraging employee blogs, customer forums, greater use of multimedia content and images and self-created encyclopaedias (or ‘wikis’). As with all new ...
 
05.01.09
 
Avoid Serious Data Breaches With Secure File Transfer
You cannot pick up a newspaper today or view a news website without reading about the latest incident of a mass data breach. The financial loss associated with a company’s data breach is potentially huge, not only destroying an ...
 
22.12.08
 
Digital Fingerprints: Who Knows Where You Have Been?
The Internet has changed the way we live: in our personal lives, we can communicate with friends and family - both near and far - and know that our message will reach them at the touch of a button. Similarly, we no longer ...
 
18.12.08
 
The Role Of The Family Administrator
There can be no argument about the growing importance of the Internet in young people’s lives and its place in everyday life at home. As a result, parents everywhere are looking to protect their children from the modern threats ...
 
11.12.08
 
Uncancel Christmas
With doom and gloom on the high street there is a very real sense that Christmas might just be cancelled this year. Lack of job security and plummeting house values are encouraging the UK consumer to radically change spending ...
 
04.12.08
 
Touching Me, Touching You
The world’s gone security crazy. Everywhere we go stronger measures are being implemented to combat impersonation, ID theft and fraud. Following news that a leading chain of kiddie’s nurseries in the UK is requiring parents to ...
 
07.11.08
 
Are We Facing The End Of Business As We Know It?
The simple truth is that markets implode regularly and usually with good reason. While you might think that the $5 trillion of market value lost in the dot com crash of the early part of this decade would have taught a few ...
 
07.11.08
 
Facing Up To Information Overload
Information is a gift and a curse. It lies at the heart of today’s knowledge economy, allowing organisations to create wealth through its distribution and manipulation. No company could function without it. But in recent years ...
 
06.11.08
 
Storing Data On The Move
Business has become increasingly mobile with more employees keeping in touch with the office by checking e-mails on their mobile phones or remotely dialling into office servers from across the globe. This means that more people ...
 
05.11.08
 
The Future Of Fuel Cell Adoption
Fuel cells have been causing a stir throughout the power industry recently. Promises of their reliability, application and cleaner emissions make them seem the Holy Grail of sustainable energy, and with more and more ...
 
04.11.08
 
Lipstick On A Pig
As someone that has become totally engrossed in the upcoming U.S. elections, Barack Obama’s comment about Lipstick on a Pig resonated because in my opinion it just about sums up the approach to IT security in most enterprises ...
 
03.11.08
 
Do We Still Need To Migrate Data?
For a very long time the received wisdom has been that if only companies could gain a 360-degree view of the information they hold - provided that information is also accurate and up-to-date - they could revolutionise the way ...
 
31.10.08
 
   
      © 2003-2009 Black Letter Publishing. ITreviewed is not responsible for the content of external Web sites