Data Security - Page 111

Securing your data and network, inside and outside the perimeter

Who's Hacking?

17 Feb, 2010

At the end of last year, I talked a bit about Cyber Challenge, a contest where hacking skills could lead to security jobs. Another annual contest comes up in March, the Pwn2Own 2010 to test hacking ...More >

Are You Feeding a Dinosaur?

16 Feb, 2010

In the 21st century, I think we can add to Ben Franklin's ultimate certainties of death and taxes . . . and that will be the need to protect our computers.   And just like it is human nature to ...More >

Writing Rugged Code

11 Feb, 2010

Programming mistakes can lead to vulnerabilities, like the recent problems with Flash.   According to Tim Greene's Network World article, that's why three security professionals -- Josh Corman, ...More >

How Your Business Can Cut Down on Identity Fraud

10 Feb, 2010

Last month, IT Business Edge reported on the guilty pleas by several men who committed identity theft. Unfortunately, the men are part of a growing trend. Javelin Strategy and Research released its ...More >

First Point of Security: Apply Those Patches!

08 Feb, 2010

Earlier I pointed out the importance of making sure you remain up-to-date on patches, as recommended by Kevin Prince at our Network Security Edge site. My colleague here at IT Business Edge, Paul ...More >

Social Media and Security: 2010 and Beyond

05 Feb, 2010

Love it or hate it, one thing is true: Social media applications are here to stay, at least through the foreseeable future. Gartner recently announced its five social media software predictions for ...More >

Avoiding Viruses Without Unplugging

03 Feb, 2010

Since my run-in with the Antivirus Live attack, I've been hyper-vigilant on virus and malware scans on my computer, especially any time my computer seems sluggish.   Getting hit with some kind ...More >

Exploited Vulnerabilities: Blame Yourself

01 Feb, 2010

Interesting news coming from the United Kingdom-the UK's government has no plans to switch from using IE6, despite a vulnerability in the browser that was exploited by hackers.   Exploiting ...More >

Creating a Culture of Awareness

29 Jan, 2010

In his article on Network Security Edge, Top 10 Information Security Threats of 2010, Kevin Prince, CTO of Perimeter, talks of two specific employee-related security threats: malicious insiders (a ...More >

Happy Data Privacy Day

28 Jan, 2010

January 28 is always marked on my calendar because it's my sister's birthday, but now the calendar square shares space with another event-it's Data Privacy Day. According to the official Web site: ...More >

Pages:  First  « Prev109110 | 111 112113Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.