dcsimg

Data Security - Page 110

Securing your data and network, inside and outside the perimeter

Bringing Security Back In-House

27 May, 2010

Outsourcing IT security isn't a new idea. I found an essay written by Bruce Schneier from 2002 where Schneier argues the case for outsourcing security. He wrote: The primary argument for outsourcing ...More >

Use Google at Your Own Risk

26 May, 2010

I loved the title of this Computerworld article: "The Smart Paranoid's Guide to Using Google."   More than a catchy title, the article provided a good deal of wisdom regarding Google's privacy ...More >

What Your Browser Says About You

21 May, 2010

Another day, another round of Facebook and privacy articles.   However, today I came across another article that took me back to the old days, when privacy concerns centered around browsers and ...More >

Third-Party Security Risks Cause Problems for the VA

18 May, 2010

In January, Kevin Prince, Chief Technology Officer of Perimeter, gave his list of top security threats for 2010. Number 5 on his list -- and considered a rising threat -- is mobile devices. Prince ...More >

Fixing the Cyber Infrastructure

14 May, 2010

A few years ago, my colleague Susan Hall posed the question: Is Internet downtime more frequent these days, or does it just seem that way?   Unfortunately, the cyber infrastructure that causes ...More >

Don't Be Fooled by Trojan Posing as a Windows 7 Compatability Tool

12 May, 2010

One of the better features in Windows 7 is its improved security measures -- it's one of the reasons I want to make the switch.   However, BitDefender discovered an attack apparently aimed at ...More >

Who Will Lead Cybersecurity Efforts?

11 May, 2010

The increase of cyberattacks has garnered the attention of the White House and Congress, which has allocated billions toward fighting the issue.   However, cybersecurity is a relatively new area ...More >

No Difference Between Programming Languages When It Comes to Security

07 May, 2010

Discussion of programming languages can certainly stir up plenty of debates, including which Web programming language is most secure.   But according to the ninth installment of the WhiteHat ...More >

U.S. Treasury Web Exploitation Not That Uncommon

05 May, 2010

By now you may have heard the news that several U.S. Treasury websites were hacked, involving an attack site in Ukraine. However, as Roger Thompson, chief research officer at AVG, pointed out, even ...More >

Pages:  First  « Prev108109 | 110 111112Next »  Last
Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.