Feeds

The Blair Net Project

Enough hot air to stage a round the world balloon flight

  • alert
  • submit to reddit

SANS - Survey on application security programs

Tony Blair flirted with technology today by ordering flowers online for his wife Cheri. One vulture-eyed Registerreader who attended the appointment of Britain's first E-envoy watched the PM in action as he visited the Interflora Web site. Although his technical ability was sound, by all accounts his typing was lousy. No matter, at least this little PR stunt will endear the PM as a romantic if nothing else. But what of his e-credentials -- how did they fare? Predictably, the PM was big on rhetoric and little else. "Britain has a proud history as a great trading nation," he puffed. "We were the first industrial power -- the workshop of the world. Great inventions have "made in Britain" stamped all over them. We are a creative, innovative adventurous people. "Today we need that spirit of adventure more than ever. We need to face up to a new challenge -- the challenge of new information technologies." The soundbite of the day -- which will be regurgitated ad nauseum -- was equally predictable and just as lame. "To British business: a blunt message: if you don't see the Internet as an opportunity, it will be a threat. In two or three years time the Internet could be as commonplace in the office as the telephone. If you're not exploiting the opportunities of ecommerce, you could risk going bankrupt." Don't say you haven't been warned. ®

Combat fraud and increase customer satisfaction

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.