dcsimg

Data Security - Page 113

Securing your data and network, inside and outside the perimeter

March 1 Deadline for Massachusetts Data-Security Law Looms

24 Feb, 2010

March 1 is days away. If you do business with people from Massachusetts, the month might arrive like a lion -- and not because of another Nor'easter. March 1 is the deadline date for a new state law ...More >

HHS Taking Steps to Prevent Breaches

23 Feb, 2010

Despite the HIPAA privacy law, despite increase awareness, and even despite all of the negative publicity generated from the Heartland situation, the health care industry continues to be victimized ...More >

A Security View of the State of the Web

22 Feb, 2010

The abstract of Zscaler's State of the Web report for the fourth quarter of 2009 doesn't pull any punches. The first lines state: Attackers are no longer targeting web and email servers. Today, they ...More >

Zeus in the News

19 Feb, 2010

I suppose with the Olympics dominating the sports pages this week, it is a logical parallel that the Zeus Trojan is headlining security news. The Wall Street Journal reported on the Zeus Trojan, aka ...More >

Who's Hacking?

17 Feb, 2010

At the end of last year, I talked a bit about Cyber Challenge, a contest where hacking skills could lead to security jobs. Another annual contest comes up in March, the Pwn2Own 2010 to test hacking ...More >

Are You Feeding a Dinosaur?

16 Feb, 2010

In the 21st century, I think we can add to Ben Franklin's ultimate certainties of death and taxes . . . and that will be the need to protect our computers.   And just like it is human nature to ...More >

Writing Rugged Code

11 Feb, 2010

Programming mistakes can lead to vulnerabilities, like the recent problems with Flash.   According to Tim Greene's Network World article, that's why three security professionals -- Josh Corman, ...More >

How Your Business Can Cut Down on Identity Fraud

10 Feb, 2010

Last month, IT Business Edge reported on the guilty pleas by several men who committed identity theft. Unfortunately, the men are part of a growing trend. Javelin Strategy and Research released its ...More >

First Point of Security: Apply Those Patches!

08 Feb, 2010

Earlier I pointed out the importance of making sure you remain up-to-date on patches, as recommended by Kevin Prince at our Network Security Edge site. My colleague here at IT Business Edge, Paul ...More >

Social Media and Security: 2010 and Beyond

05 Feb, 2010

Love it or hate it, one thing is true: Social media applications are here to stay, at least through the foreseeable future. Gartner recently announced its five social media software predictions for ...More >

Pages:  First  « Prev111112 | 113 114115Next »  Last
Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.