dcsimg

Data Security - Page 113

Securing your data and network, inside and outside the perimeter

Writing Rugged Code

11 Feb, 2010

Programming mistakes can lead to vulnerabilities, like the recent problems with Flash.   According to Tim Greene's Network World article, that's why three security professionals -- Josh Corman, ...More >

How Your Business Can Cut Down on Identity Fraud

10 Feb, 2010

Last month, IT Business Edge reported on the guilty pleas by several men who committed identity theft. Unfortunately, the men are part of a growing trend. Javelin Strategy and Research released its ...More >

First Point of Security: Apply Those Patches!

08 Feb, 2010

Earlier I pointed out the importance of making sure you remain up-to-date on patches, as recommended by Kevin Prince at our Network Security Edge site. My colleague here at IT Business Edge, Paul ...More >

Social Media and Security: 2010 and Beyond

05 Feb, 2010

Love it or hate it, one thing is true: Social media applications are here to stay, at least through the foreseeable future. Gartner recently announced its five social media software predictions for ...More >

Avoiding Viruses Without Unplugging

03 Feb, 2010

Since my run-in with the Antivirus Live attack, I've been hyper-vigilant on virus and malware scans on my computer, especially any time my computer seems sluggish.   Getting hit with some kind ...More >

Exploited Vulnerabilities: Blame Yourself

01 Feb, 2010

Interesting news coming from the United Kingdom-the UK's government has no plans to switch from using IE6, despite a vulnerability in the browser that was exploited by hackers.   Exploiting ...More >

Creating a Culture of Awareness

29 Jan, 2010

In his article on Network Security Edge, Top 10 Information Security Threats of 2010, Kevin Prince, CTO of Perimeter, talks of two specific employee-related security threats: malicious insiders (a ...More >

Happy Data Privacy Day

28 Jan, 2010

January 28 is always marked on my calendar because it's my sister's birthday, but now the calendar square shares space with another event-it's Data Privacy Day. According to the official Web site: ...More >

Report: Dangers of Cyber Crime on the Rise

27 Jan, 2010

A lot has been written this past month about security risks to watch out for in 2010.   However, the results of the 2010 CSO Cyber Watch Survey, a cooperative effort between the U.S. Secret ...More >

Don't Get Caught by Spear Phishing

26 Jan, 2010

The attacks on Google in China were part of a spear phishing campaign.   Now, several U.S. oil companies report being victimized by spear phishing. According to a report in The Christian Science ...More >

Pages:  First  « Prev111112 | 113 114115Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.