7 articles written

Deborah Gage

Popular

“We Really Did Screw Up”

After the third time in a year he thought...

How To Plug 5 Big Security Holes

Security has been the bugaboo of information technology for...

Big Software: Finally Dead

Ever since the mid-1990s, when the Internet became indispensable,...

Cybercriminals Turn Their Attention to the Corporate World

Banks and financial services companies are the favorite targets...

Explore

Big Software: Finally Dead

Ever since the mid-1990s, when the Internet became indispensable, someone has been predicting the death of big enterprise software,...

Cyberwar: Is This The First Salvo?

Estonia claims that Russia launched a virtual attack this past month against government agencies, followed by cyberassaults on its...

“We Really Did Screw Up”

After the third time in a year he thought he was scheduled for surgery to replace his failing kidneys,...

Computer Security: Stop Playing With Hackers

The Problem: An online gaming company, K2 Network, is threatened by hackers who attack Web sites to extort money...

How To Plug 5 Big Security Holes

Security has been the bugaboo of information technology for years—certainly since the advent of the Web in the mid-1990s....

Six Tips for Business Intelligence Success

As business intelligence tools become sharper and more readily available, a new wave of workers—from sales to logistics—can analyze...

Cybercriminals Turn Their Attention to the Corporate World

Banks and financial services companies are the favorite targets for Trojan (malware) and software probes, according to a report...

Other Articles