dcsimg

Data Security - Page 113

Securing your data and network, inside and outside the perimeter

Addressing OAuth Flaws

20 Jan, 2010

A few days ago, my colleague Loraine Lawson suggested some reading material on OAuth and security issues. For those of you unfamiliar with OAuth, it's "an open protocol to allow secure API ...More >

Do You Know What Is on Your Employees' Computers?

19 Jan, 2010

When it comes to IT security, your company's biggest threat is likely on your payroll-employees who forget to log off from password-protected databases or who lose flashdrives with confidential ...More >

Changes Needed in Reporting Data Breaches

14 Jan, 2010

The Identity Theft Resource Center released its latest data breach information, and the information, to say the least, is confusing. According to the ID Theft Center:   "In 2009, the Identity ...More >

CMS Security Could Be Your Company's Weak Spot

12 Jan, 2010

Content Management Systems (CMS) have been a boon to businesses and managing data. However, it is easy to underestimate the security risks that come with CMS.   I spoke with Tony Byrne, founder ...More >

Cyber Protesting on the Rise

08 Jan, 2010

A trending story caught my eye today-around the world, protestors are hacking government Web sites.   On the European Union site, instead of a photo of the Spanish Prime Minister, there was a ...More >

Be Smart with Smartphone Security Policies and Practice

07 Jan, 2010

With all the fuss this week about the release of Google's new smartphone, this is a good time to remember that smartphones operate more like a computer than a phone and they need the same care as the ...More >

Google Chrome's Troublesome Weaknesses

06 Jan, 2010

When the Google Chrome Web browser was released at the end of 2008, a number of my IT acquaintances advised me to make the switch, especially since it would be more stable and secure than IE.   ...More >

Security Theater: The Latest Buzz Phrase

04 Jan, 2010

The term "security theater" may have been around for a while, but it seems to be on everyone's lips since the failed terrorist attack on Christmas Day.   Security theater is the intention to ...More >

A New Year Deserves New Security Strategies

30 Dec, 2009

With the news of the latest terrorist attempt and revamped security efforts for travelers dominating the headlines the past few days, I couldn't help but think about how important it is to be ...More >

Enforcement Key to a Strong Security Policy Plan

29 Dec, 2009

Earlier this month, I posed the question: Does your company need a security audit plan?   A good security audit will show that most security breaches are preventable. An article at IT Security ...More >

Pages:  First  « Prev111112 | 113 114115Next » 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.


×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.