Data Security - Page 113

Securing your data and network, inside and outside the perimeter

Does Second Smartphone Infection Indicate a Trend?

17 Mar, 2010

Twice in the span of about a week, traces of the Mariposa botnot were found in SD cards of HTC Magic phones. Panda Security's PandaResearch blog has been following this story closely, reporting that ...More >

The Need for Security in the Cloud Isn't One-Size-Fits-All

15 Mar, 2010

The rainy weather in the Northeast has me thinking about clouds -- or more specifically, cloud security.   At RSA 2010, IEEE and Cloud Security Alliance released a survey that looks at the ...More >

How Bright Is the Future for IT Security Pros?

08 Mar, 2010

It's a career that looks like it should have a solid future, but instead, IT security professionals see a mixed job outlook.   Skeptics point out that IT opportunities in general are being ...More >

Is Twitter a Good Fit for Your Company?

04 Mar, 2010

I love this opening paragraph written by Neil Roiter for CIO.com: Businesses are still trying to figure out what to make of social networking. The knee-jerk impulse at some companies is to ban its ...More >

Just Because We Know About Zeus Doesn't Mean It's Easy to Eliminate

03 Mar, 2010

Last month I wrote about the Zeus Trojan and its infiltration of the banking industry. As I mentioned then, Zeus isn't a new virus, with activity going back a couple of years, but it was recently ...More >

Twitter Account Hacked? Let Your Customers Know

01 Mar, 2010

There's no doubting Twitter's and microblogging's growing role in the way we communicate. But there are plenty of kinks to be worked out. Twitter has been hacked and has crashed. Shortened URLs, a ...More >

Don't Get Spoofed

26 Feb, 2010

Cell phone spoofing isn't a new problem. It's where someone sends a text message from one phone and makes it look like it is from a phone you know -- phishing through SMS, if you will. It also can be ...More >

March 1 Deadline for Massachusetts Data-Security Law Looms

24 Feb, 2010

March 1 is days away. If you do business with people from Massachusetts, the month might arrive like a lion -- and not because of another Nor'easter. March 1 is the deadline date for a new state law ...More >

HHS Taking Steps to Prevent Breaches

23 Feb, 2010

Despite the HIPAA privacy law, despite increase awareness, and even despite all of the negative publicity generated from the Heartland situation, the health care industry continues to be victimized ...More >

Pages:  First  « Prev111112 | 113 114115Next »  Last
Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.