Data Security - Page 112

Securing your data and network, inside and outside the perimeter

Report: Dangers of Cyber Crime on the Rise

27 Jan, 2010

A lot has been written this past month about security risks to watch out for in 2010.   However, the results of the 2010 CSO Cyber Watch Survey, a cooperative effort between the U.S. Secret ...More >

Don't Get Caught by Spear Phishing

26 Jan, 2010

The attacks on Google in China were part of a spear phishing campaign.   Now, several U.S. oil companies report being victimized by spear phishing. According to a report in The Christian Science ...More >

Google and China: Looking Forward

25 Jan, 2010

A lot has been written about the recent attacks on Google. So what does the Google experience teach us about the future?   During my conversation with Scott Crawford, research director of ...More >

OAuth WRAP Security Skeptics Speak Out

22 Jan, 2010

Earlier this week, I began a discussion on security flaws in OAuth.   OAuth WRAP is supposed be more simple than OAuth. But that doesn't necessarily mean that it's better, as Ben Adida wrote on ...More >

Why HTML 5 Could Present Web App Security Risk

22 Jan, 2010

In my post about the potential security problems with Google's Chrome OS, I added a quote that says that Chrome's use of HTML 5 may be a target of hackers. So, what's the issue with HTML 5? For a ...More >

Addressing OAuth Flaws

20 Jan, 2010

A few days ago, my colleague Loraine Lawson suggested some reading material on OAuth and security issues. For those of you unfamiliar with OAuth, it's "an open protocol to allow secure API ...More >

Do You Know What Is on Your Employees' Computers?

19 Jan, 2010

When it comes to IT security, your company's biggest threat is likely on your payroll-employees who forget to log off from password-protected databases or who lose flashdrives with confidential ...More >

Changes Needed in Reporting Data Breaches

14 Jan, 2010

The Identity Theft Resource Center released its latest data breach information, and the information, to say the least, is confusing. According to the ID Theft Center:   "In 2009, the Identity ...More >

CMS Security Could Be Your Company's Weak Spot

12 Jan, 2010

Content Management Systems (CMS) have been a boon to businesses and managing data. However, it is easy to underestimate the security risks that come with CMS.   I spoke with Tony Byrne, founder ...More >

Cyber Protesting on the Rise

08 Jan, 2010

A trending story caught my eye today-around the world, protestors are hacking government Web sites.   On the European Union site, instead of a photo of the Spanish Prime Minister, there was a ...More >

Pages:  First  « Prev110111 | 112 113114Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.