dcsimg

Data Security - Page 112

Securing your data and network, inside and outside the perimeter

Securing the Mobile Office: Your Car

10 Mar, 2010

When I'm in my car, I like to listen to music and enjoy some "unplugged" time. I'm in the minority, I know. Our vehicles have become remote offices and today's cars are being equipped with the latest ...More >

How Bright Is the Future for IT Security Pros?

08 Mar, 2010

It's a career that looks like it should have a solid future, but instead, IT security professionals see a mixed job outlook.   Skeptics point out that IT opportunities in general are being ...More >

Is Twitter a Good Fit for Your Company?

04 Mar, 2010

I love this opening paragraph written by Neil Roiter for CIO.com: Businesses are still trying to figure out what to make of social networking. The knee-jerk impulse at some companies is to ban its ...More >

Just Because We Know About Zeus Doesn't Mean It's Easy to Eliminate

03 Mar, 2010

Last month I wrote about the Zeus Trojan and its infiltration of the banking industry. As I mentioned then, Zeus isn't a new virus, with activity going back a couple of years, but it was recently ...More >

Twitter Account Hacked? Let Your Customers Know

01 Mar, 2010

There's no doubting Twitter's and microblogging's growing role in the way we communicate. But there are plenty of kinks to be worked out. Twitter has been hacked and has crashed. Shortened URLs, a ...More >

Don't Get Spoofed

26 Feb, 2010

Cell phone spoofing isn't a new problem. It's where someone sends a text message from one phone and makes it look like it is from a phone you know -- phishing through SMS, if you will. It also can be ...More >

March 1 Deadline for Massachusetts Data-Security Law Looms

24 Feb, 2010

March 1 is days away. If you do business with people from Massachusetts, the month might arrive like a lion -- and not because of another Nor'easter. March 1 is the deadline date for a new state law ...More >

HHS Taking Steps to Prevent Breaches

23 Feb, 2010

Despite the HIPAA privacy law, despite increase awareness, and even despite all of the negative publicity generated from the Heartland situation, the health care industry continues to be victimized ...More >

A Security View of the State of the Web

22 Feb, 2010

The abstract of Zscaler's State of the Web report for the fourth quarter of 2009 doesn't pull any punches. The first lines state: Attackers are no longer targeting web and email servers. Today, they ...More >

Zeus in the News

19 Feb, 2010

I suppose with the Olympics dominating the sports pages this week, it is a logical parallel that the Zeus Trojan is headlining security news. The Wall Street Journal reported on the Zeus Trojan, aka ...More >

Pages:  First  « Prev110111 | 112 113114Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.