HomeIT Management

IT Management

Tech Industry Asks for Government Help

Concerned that the United States may lose its competitive edge in innovation to countries like China and India, captains of American industry are turning...

Adobe Plugs PC Takeover Hole in Flash Player

Adobe Systems Flash Player contains a code execution hole that could put millions of users at risk of PC takeover attacks, the company warned...

Dutch Researchers Create RFID Malware

Pranksters and criminals can infect RFID chips with computer viruses, worms and malware to cause major disruption at places where the popular tracking technology...

McAfee Bumps Weiss into President Slot

McAfee has turned inside to fill the leadership hole left when its president, Gene Hodges, abruptly quit on Jan. 10.The anti-virus security vendor announced...

Terms of Web Service Endearment

As I noted in a summary blog from last weeks OReilly Emerging Technology Conference in San Diego, the competition there to launch new Web...

WebInspect 5.8

While WebInspect includes new features and improved wizards to boost the usability of the product, it still works in a fairly classic penetration-testing mode...

Rooting Out Web App Holes

Despite all the attention that security holes in various operating systems get, the most likely avenue for successfully compromising a corporate system is a...

Appscan 6.0

AppScan 6.0 is the second official release of the product since Watchfire acquired the technology when it bought Sanctum. The previous release was mainly...

Distributor Tosses Paper for Digital

When the time came for California Distribution to upgrade its copiers, David Friday wanted more than just photocopying capability. His company based its performance...

ERP: Share and Share Alike

For the largest enterprises, access to the source code of their enterprise resource planning applications is a given. The critical nature of ERP, the...