dcsimg

Most Recent Data Security

Creating a Culture of Awareness

January 29, 2010 |
In his article on Network Security Edge, Top 10 Information Security Threats of 2010, Kevin Prince, CTO of Perimeter, talks of two specific employee-related security threats: malicious insiders (a
READ MORE

Happy Data Privacy Day

January 28, 2010 |
January 28 is always marked on my calendar because it's my sister's birthday, but now the calendar square shares space with another event-it's Data Privacy Day. According to the official Web site:
READ MORE

Report: Dangers of Cyber Crime on the Rise

January 27, 2010 |
A lot has been written this past month about security risks to watch out for in 2010.   However, the results of the 2010 CSO Cyber Watch Survey, a cooperative effort between the U.S. Secret
READ MORE

Don't Get Caught by Spear Phishing

January 26, 2010 |
The attacks on Google in China were part of a spear phishing campaign.   Now, several U.S. oil companies report being victimized by spear phishing. According to a report in The Christian Science
READ MORE

Google and China: Looking Forward

January 25, 2010 |
A lot has been written about the recent attacks on Google. So what does the Google experience teach us about the future?   During my conversation with Scott Crawford, research director of
READ MORE

OAuth WRAP Security Skeptics Speak Out

January 22, 2010 |
Earlier this week, I began a discussion on security flaws in OAuth.   OAuth WRAP is supposed be more simple than OAuth. But that doesn't necessarily mean that it's better, as Ben Adida wrote on
READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS

Why HTML 5 Could Present Web App Security Risk

January 22, 2010 |
In my post about the potential security problems with Google's Chrome OS, I added a quote that says that Chrome's use of HTML 5 may be a target of hackers. So, what's the issue with HTML 5? For a
READ MORE

Addressing OAuth Flaws

January 20, 2010 |
A few days ago, my colleague Loraine Lawson suggested some reading material on OAuth and security issues. For those of you unfamiliar with OAuth, it's "an open protocol to allow secure API
READ MORE

Do You Know What Is on Your Employees' Computers?

January 19, 2010 |
When it comes to IT security, your company's biggest threat is likely on your payroll-employees who forget to log off from password-protected databases or who lose flashdrives with confidential
READ MORE

Changes Needed in Reporting Data Breaches

January 14, 2010 |
The Identity Theft Resource Center released its latest data breach information, and the information, to say the least, is confusing. According to the ID Theft Center:   "In 2009, the Identity
READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS