dcsimg

Data Security - Page 116

Securing your data and network, inside and outside the perimeter

CMS Security Could Be Your Company's Weak Spot

12 Jan, 2010

Content Management Systems (CMS) have been a boon to businesses and managing data. However, it is easy to underestimate the security risks that come with CMS.   I spoke with Tony Byrne, founder ...More >

Cyber Protesting on the Rise

08 Jan, 2010

A trending story caught my eye today-around the world, protestors are hacking government Web sites.   On the European Union site, instead of a photo of the Spanish Prime Minister, there was a ...More >

Google Chrome's Troublesome Weaknesses

06 Jan, 2010

When the Google Chrome Web browser was released at the end of 2008, a number of my IT acquaintances advised me to make the switch, especially since it would be more stable and secure than IE.   ...More >

Security Theater: The Latest Buzz Phrase

04 Jan, 2010

The term "security theater" may have been around for a while, but it seems to be on everyone's lips since the failed terrorist attack on Christmas Day.   Security theater is the intention to ...More >

A New Year Deserves New Security Strategies

30 Dec, 2009

With the news of the latest terrorist attempt and revamped security efforts for travelers dominating the headlines the past few days, I couldn't help but think about how important it is to be ...More >

Enforcement Key to a Strong Security Policy Plan

29 Dec, 2009

Earlier this month, I posed the question: Does your company need a security audit plan?   A good security audit will show that most security breaches are preventable. An article at IT Security ...More >

Nation Is Long Overdue for a Security Czar

23 Dec, 2009

You've probably heard the news by now-President Obama has appointed Howard Schmidt as the new Cyber Security Czar. I don't know what concerns me more: that it took the Administration since August ...More >

Making Sure Security Employees' Skills Stay on Par with Hackers'

21 Dec, 2009

My son is majoring in IT security in college, and this weekend, someone asked him what traits a company should look for in an IT security employee. My son smiled slyly and said, "Good hacking ...More >

Do Your Employees Respect Sensitive Data?

18 Dec, 2009

Earlier this month, a TSA manual was posted to the Internet. It listed sensitive information on how passengers are targeted for secondary screening. TSA officials said the document was an old ...More >

Pages:  First  « Prev114115 | 116 117118Next » 
Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.