Data Security - Page 114

Securing your data and network, inside and outside the perimeter

CMS Security Could Be Your Company's Weak Spot

12 Jan, 2010

Content Management Systems (CMS) have been a boon to businesses and managing data. However, it is easy to underestimate the security risks that come with CMS.   I spoke with Tony Byrne, founder ...More >

Cyber Protesting on the Rise

08 Jan, 2010

A trending story caught my eye today-around the world, protestors are hacking government Web sites.   On the European Union site, instead of a photo of the Spanish Prime Minister, there was a ...More >

Be Smart with Smartphone Security Policies and Practice

07 Jan, 2010

With all the fuss this week about the release of Google's new smartphone, this is a good time to remember that smartphones operate more like a computer than a phone and they need the same care as the ...More >

Google Chrome's Troublesome Weaknesses

06 Jan, 2010

When the Google Chrome Web browser was released at the end of 2008, a number of my IT acquaintances advised me to make the switch, especially since it would be more stable and secure than IE.   ...More >

Security Theater: The Latest Buzz Phrase

04 Jan, 2010

The term "security theater" may have been around for a while, but it seems to be on everyone's lips since the failed terrorist attack on Christmas Day.   Security theater is the intention to ...More >

A New Year Deserves New Security Strategies

30 Dec, 2009

With the news of the latest terrorist attempt and revamped security efforts for travelers dominating the headlines the past few days, I couldn't help but think about how important it is to be ...More >

Enforcement Key to a Strong Security Policy Plan

29 Dec, 2009

Earlier this month, I posed the question: Does your company need a security audit plan?   A good security audit will show that most security breaches are preventable. An article at IT Security ...More >

Nation Is Long Overdue for a Security Czar

23 Dec, 2009

You've probably heard the news by now-President Obama has appointed Howard Schmidt as the new Cyber Security Czar. I don't know what concerns me more: that it took the Administration since August ...More >

Making Sure Security Employees' Skills Stay on Par with Hackers'

21 Dec, 2009

My son is majoring in IT security in college, and this weekend, someone asked him what traits a company should look for in an IT security employee. My son smiled slyly and said, "Good hacking ...More >

Do Your Employees Respect Sensitive Data?

18 Dec, 2009

Earlier this month, a TSA manual was posted to the Internet. It listed sensitive information on how passengers are targeted for secondary screening. TSA officials said the document was an old ...More >

Pages:  First  « Prev112113 | 114 115116Next » 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.