In some cases, narrow identity management solutions will scale up to greater ambitions. In others, the scope may remain small. At both extremes, identity management pays off in very concrete ways when the scope and details are determined by the needs of the business.
Despite evidence of al-Qaeda's research into American utility companies gleaned from laptops seized after the Sept. 11 terrorist attacks, don't expect the U.S. National Security Agency, U.S. Central Intelligence Agency and U.S. Federal Bureau of Investigation to warn businesses when a cyberattack might take place.
Predictions that IT security jobs would be hot after the Sept. 11 terrorist attacks have not come true. Would-be employers say their security budgets are flat, risks and threats are rising, and they're being asked to do more with less because of staffing shortfalls elsewhere within their IT organizations.
Rising concerns about the security of sensitive information are forcing IT managers to turn their attention to the richest repositories of data: their data warehouses.
Researchers have discovered a third vector to the Nimda worm, which is set to propagate again through email at 1:00 a.m. Eastern Standard Time (EST) Friday.