dcsimg

Data Security - Page 112

Securing your data and network, inside and outside the perimeter

A Security View of the State of the Web

22 Feb, 2010

The abstract of Zscaler's State of the Web report for the fourth quarter of 2009 doesn't pull any punches. The first lines state: Attackers are no longer targeting web and email servers. Today, they ...More >

Zeus in the News

19 Feb, 2010

I suppose with the Olympics dominating the sports pages this week, it is a logical parallel that the Zeus Trojan is headlining security news. The Wall Street Journal reported on the Zeus Trojan, aka ...More >

Who's Hacking?

17 Feb, 2010

At the end of last year, I talked a bit about Cyber Challenge, a contest where hacking skills could lead to security jobs. Another annual contest comes up in March, the Pwn2Own 2010 to test hacking ...More >

Are You Feeding a Dinosaur?

16 Feb, 2010

In the 21st century, I think we can add to Ben Franklin's ultimate certainties of death and taxes . . . and that will be the need to protect our computers.   And just like it is human nature to ...More >

Writing Rugged Code

11 Feb, 2010

Programming mistakes can lead to vulnerabilities, like the recent problems with Flash.   According to Tim Greene's Network World article, that's why three security professionals -- Josh Corman, ...More >

How Your Business Can Cut Down on Identity Fraud

10 Feb, 2010

Last month, IT Business Edge reported on the guilty pleas by several men who committed identity theft. Unfortunately, the men are part of a growing trend. Javelin Strategy and Research released its ...More >

First Point of Security: Apply Those Patches!

08 Feb, 2010

Earlier I pointed out the importance of making sure you remain up-to-date on patches, as recommended by Kevin Prince at our Network Security Edge site. My colleague here at IT Business Edge, Paul ...More >

Social Media and Security: 2010 and Beyond

05 Feb, 2010

Love it or hate it, one thing is true: Social media applications are here to stay, at least through the foreseeable future. Gartner recently announced its five social media software predictions for ...More >

Avoiding Viruses Without Unplugging

03 Feb, 2010

Since my run-in with the Antivirus Live attack, I've been hyper-vigilant on virus and malware scans on my computer, especially any time my computer seems sluggish.   Getting hit with some kind ...More >

Exploited Vulnerabilities: Blame Yourself

01 Feb, 2010

Interesting news coming from the United Kingdom-the UK's government has no plans to switch from using IE6, despite a vulnerability in the browser that was exploited by hackers.   Exploiting ...More >

Pages:  First  « Prev110111 | 112 113114Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.