eBay

Whatever it is, you can buy it or sell it on eBay. Whole towns have been sold on the auction site. Jeweler Tiffany came up dry, though, in a lawsuit aimed at forcing the site to monitor sellers dealing in knockoffs. And software makers are considering a similar crackdown on piracy. Scammers are quick to try to make a buck off transactions on the site and its associated payment system, PayPal. As e-commerce evolves, so does eBay, adding services to address the times, including Skype VoIP service.


Articles

The New Face of Data Security Professionals: Women

A new report states that women possess the communication skills and diverse academic backgrounds needed to bolster security performance in the enterprise. More >

Phone Fraud on the Rise: Report

Pindrop Security claims that call centers are losing $0.57 per call due to fraud. More >

IPv6 Presents Opportunities and Risks

IPv6 promises improved network performance and better Internet accessibility, but many security experts say the standard also creates new dangers. More >

More Articles >

Interviews

IAPP’s New Privacy Certification Addresses Emerging Landscape

New privacy threats and concerns have created the opportunity for IT professionals to fill a crucial role within the organization. A new cert addresses the need.

More >

Making VDI More Secure

Don't ignore these potentially serious vulnerabilities.

More >

Data at Home and in the Cloud

Cloud means that an enterprise must trust a service provider to provide controls at a physical and infrastructure layer, but logical controls can remain the same.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

Top 10 Phone Scams of 2014

Security Staffing

Each year, thousands of consumers and businesses lose money to scams conducted over the telephone. These scams can cost victims anything from a few dollars to their life savings.

 More >

Data Center 2015: Where Do We Go from Here?

For Your Holiday Reading List: ‘The Coder’s Path to Wealth and Independence’

Diversity in the Market: A Server for Every Workload

BlackBerry Year in Review: Taking Back Its Market

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Security44 Assessing Security and Privacy Controls in Federal Information Systems and Organizations

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...

Misc43 Guidelines for Smart Grid Cybersecurity

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...

Money3 PCI Compliance: The Definitive Guide

In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization mus...

Security17 Approximate Matching: Definition and Terminology

Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can b...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date