Printer Friendly

Browse Data security topic

Management subtopic



1-300 out of 416 article(s) nextnext page
Title Author Type Date Words
Data protection for the HR department. Arden, Ron Nov 1, 2015 687
Developing a cyberbreach strategy. Tuttle, Hilary Oct 1, 2015 3049
Helping the C-suite assess cyberrisk. Dennis, Patrick Oct 1, 2015 940
Forming a culture of security: if the bad guys' can hack into the federal government, Home Depot and Target, what hope do small businesses have? Victor, Adam Sep 4, 2015 590
Are you sitting on a cyber security bombshell? Dobrian, Joseph Sep 1, 2015 1688
No one is safe. Berman, Alan Sep 1, 2015 1848
The cure to improve and protect health care records. Bagwell, Scott Sep 1, 2015 1440
Tax technology: forging forward - but how fast and in which direction? Data rules the tax technology roost, elevating professionals who embrace its potential, but the "new normal" is not without its pitfalls. Levin-Epstein, Michael Cover story Sep 1, 2015 6232
The challenges of cross-border discovery. Report Jul 1, 2015 388
Personal precautions. Lesonsky, Rieva Column Jul 1, 2015 1770
A survey on trust management in cloud computing. Judgi, T.; Varalakshmi, P. Report Jun 1, 2015 3453
Review of security threats and its countermeasures in Mobile Adhoc Networks. Geetha, A.; Sreenath, N. Report Jun 1, 2015 2982
Cyberattacks threaten critical infrastructure. Locaria, Dismas; Wool, Jason R. May 1, 2015 1069
Patterson Dental introduces AutoSDS[SM] to help dental practices manage safety data, as required by the Occupational Safety and Health Administration (OSHA). Brief article May 1, 2015 169
Protecting organizations--and culture--through digital preservation. Wiler, Vicki May 1, 2015 520
New Russian data residency law has far-reaching effects. Brief article May 1, 2015 290
Study says: Europeans fear their data isn't safe. May 1, 2015 367
Legal departments are prime targets for hackers. Brief article May 1, 2015 255
Secure connectivity in the age of the teleworker. Walsh, Steve Apr 17, 2015 750
Defending the corporate network from cybercrime. Sax, Douglas Apr 17, 2015 573
Security study: ditch the username and password. Apr 17, 2015 592
Establishing and monitoring the right metrics for RIM program success. Wiler, Vicki Editorial Mar 1, 2015 510
CIGO may be next step in information governance. Brief article Mar 1, 2015 329
Assess to be 'the best' in 2015. Wiler, Vicki Editorial Jan 1, 2015 559
Executives say--but don't act like--data security is vital. Jan 1, 2015 328
Europe's biggest cybersecurity threat isn't hackers. Brief article Jan 1, 2015 189
Social media makes e-discovery a headache. Brief article Jan 1, 2015 296
Guidelines on data breach insurance released. Brief article Jan 1, 2015 165
Count the cost: quantifying your vital records' risks: quantitative risks assessment, which uses numeric calculations to measure the likelihood and impact of the loss of specific vital records, provides a solid basis for planning how to protect them. Saffady, William Jan 1, 2015 2626
Mobile under control: software allows districts to manage and secure a wide range of tablets and other devices. Remis, Katie Kilfoyle Dec 1, 2014 1827
Identity hack! Is your company next? Mulig, Elizabeth; Smith, L. Murphy; Stambaugh, Clyde T. Dec 1, 2014 3457
Historic Florida School expands security capabilities with new technology: mobile duress system from Inovonics part of diverse security strategy at the Cushman School. Nov 1, 2014 585
Maintaining safety and privacy in a digital world: the rapidly-expanding world of digital media poses many challenges for nurses in their daily practice. O'Connor, Teresa Nov 1, 2014 962
Shattering stereotypes with IG skills. Wiler, Vicki Editorial Nov 1, 2014 538
Healthcare industry battles breaches. Nov 1, 2014 334
Get ready for wearable technology in the office. Nov 1, 2014 587
Notable trends in e-discovery. Nov 1, 2014 397
Cloud control: managing the risks of engaging and terminating cloud services. Boyd, Brian Y. Nov 1, 2014 2875
Research says: focus on business technology agenda to ensure IG success. McKinnon, Cheryl Nov 1, 2014 2626
Divisive security. Collins, J. Carlton Oct 1, 2014 692
Investing in privacy and your career--by design. Wiler, Vicki Sep 1, 2014 518
Congress asked to help protect consumers' data. Brief article Sep 1, 2014 245
Cyber crime costs more than $400b annually. Sep 1, 2014 316
Data privacy becomes an HR issue. Brief article Sep 1, 2014 211
New risk maturity index emerges from study. Sep 1, 2014 513
Needed: cybersecurity professionals. Sep 1, 2014 538
Principles for protecting information privacy. Gable, Julie Sep 1, 2014 2477
Issues of privacy and surveillance in information age: in the web 2.0 environment and organizational setting. Ju, Ran Report Jul 1, 2014 5320
The password is always "swordfish". Phillips, C. Douglas Jul 1, 2014 427
Cut costs, risks with proactive litigation plan. Wylie, Michael C.; Layton, Kelli A. Jul 1, 2014 2466
How to develop and implement an effective RIM policy. Richardson, Blake E. Jul 1, 2014 1901
China halts cybersecurity cooperation. Brief article Jul 1, 2014 147
Survey: information governance not being embraced. Jul 1, 2014 514
Are your secrets safe? Murata, Jason; Tanski, John; Oppenheimer, Brooke Jun 1, 2014 931
Digital health services face security issues. Bruemmer, Michael Jun 1, 2014 509
The U.S. Senate has cast a vote in favor of enhanced government data transparency in passing the Digital Accountability and Transparency Act. Melancon, Barry C. Brief article May 1, 2014 111
Japan holds cybersecurity drill. Brief article May 1, 2014 236
The role of human factors in information system security. safari, Leila; Rahmati, Azizallah Report May 1, 2014 3206
Better put on your running shoes: mitigate the risks of cyber attacks. Free, Jason Apr 1, 2014 2002
Data security risk: you can take it anywhere. Sheinis, Richard; Ference, Sarah Beckett Apr 1, 2014 1140
Users are cybersecurity's Achilles heel. Jan 1, 2014 328
Core questions for cyber attack guidance. Rice, Jonathan C. Essay Oct 1, 2013 6644
Mobile information security concerns. Holub, Steven F.; Parker, Kenneth M. Sep 1, 2013 2510
Unpacking cyberwar: the sufficiency of the law of armed conflict in the cyber domain. Phillips, Kyle Genaro Report Jul 1, 2013 3591
Awaiting cyber 9/11. Magee, Clifford S. Report Jul 1, 2013 4654
Phone data dial in crime network: program mines mobile calls for incriminating patterns. Ehrenberg, Rachel Apr 20, 2013 361
Use of ontologies in mapping of information security requirements/Ontologijos naudojimas informacijos saugumo reikalavimams susieti. Ramanauskaite, Simona; Radvile, Egle; Olifer, Dmitrij Report Apr 1, 2013 1496
Incorporating global information security and assurance in I.S. education. White, Garry L.; Hewitt, Barbara; Kruck, S.E. Report Mar 22, 2013 3763
Information security assessment of SMEs as coursework--learning information security management by doing. Ilvonen, Ilona Report Mar 22, 2013 6390
Preparing information systems (IS) graduates to meet the challenges of global IT security: some suggestions. Sauls, Jeff; Gudigantala, Naveen Report Mar 22, 2013 1913
Hackers, spies, and stolen secrets: protecting law firms from data theft. Ezekiel, Alan W. Mar 22, 2013 9011
The drama continues ... on several fronts. Editorial Mar 1, 2013 528
Getting off the data storage treadmill. Wessels, Tim Nov 30, 2012 527
The first steps to managing cyber-risk. Dunbar, Thomas Oct 1, 2012 2339
Data security 101: avoiding the list: healthcare data may be ripe for the picking, and that's causing sleepless nights for many CIOs. Perna, Gabriel Oct 1, 2012 1670
The international governance framework for cybersecurity. Rosenzweig, Paul Sep 22, 2012 11630
Managing cybersecurity risks: mobile and cloud open doors to opportunities and threats. Drew, Jeff Aug 1, 2012 2838
CPAS prioritize tech security: many unsure how to best leverage emerging trends. Drew, Jeff May 1, 2012 889
Sailing the Cyber Sea. Stavridis, James G.; Parker, Elton C., III Apr 1, 2012 5201
Mitigative counterstriking: self-defense and deterrence in cyberspace. Kesan, Jay P.; Hayes, Carol M. Mar 22, 2012 10957
Mitigative counterstriking: self-defense and deterrence in cyberspace. Kesan, Jay P.; Hayes, Carol M. Mar 22, 2012 13135
Mitigative counterstriking: self-defense and deterrence in cyberspace. Kesan, Jay P.; Hayes, Carol M. Mar 22, 2012 32505
No backup. Robinson, Arthur B. Mar 22, 2012 1164
A sustainable information security framework for e-Government--case of Tanzania. Wangwe, Carina Kabajunga; Eloff, Maria Margaretha; Venter, Lucas Case study Mar 1, 2012 6134
Shredded documents brought back to life. Beidel, Eric Brief article Mar 1, 2012 279
Computer network security--evolving risks. Schirick, Edward A. Mar 1, 2012 1646
Privacy aware recommender service using multi-agent middleware --an IPTV network scenario. Elmisery, Ahmed M.; Botvich, Dmitri Report Mar 1, 2012 12367
Secure key exchange scheme for IPTV broadcasting. Pippal, Ravi Singh; Tapaswi, Shashikala; Jaidhar, C.D. Report Mar 1, 2012 3941
Times limited accountable anonymous online submission control system from single-verifier k-times group signature. Zhao, Xingwen; Zhang, Fangguo Report Mar 1, 2012 6379
Cyber security review: as threats proliferate, here are five areas where companies need to strengthen and update their policies and practices. Korolov, Maria Feb 1, 2012 1081
Unsecured mobile devices: the weak link: data breaches are becoming more common and more expensive, according to a recent study. Raths, David Feb 1, 2012 531
Malicious botnet survivability mechanism evolution forecasting by means of a genetic algorithm/Kenkejisku botnet tinklu isgyvenamumo mechanizmu evoliucijos prognozavimas genetinio algoritmo priemonemis. Goranin, Nikolaj; Cenys, Antanas; Juknius, Jonas Report Feb 1, 2012 5009
Composite DoS attack model/Jungtinis DoS ataku modelis. Ramanauskaite, Simona; Cenys, Antanas Report Feb 1, 2012 3876
Techniques for modelling network security/Kompiuteriu sistemu saugumo modeliavimas. Gulbinovic, Lech Report Feb 1, 2012 1752
SSN reduction plan Phase 1 and 2 results. Muck, Steve Jan 1, 2012 516
Life in the cloud: what exactly is cloud computing? And is it a safe way to store my files? Bertolucci, Jeff Jan 1, 2012 637
Continuous monitoring: protecting the enterprise and executive suite. Taylor, Patrick Jan 1, 2012 1545
Distributed denial of service attack principles and defense mechanisms. Zheng, Ying Report Dec 31, 2011 1663
Message-optimal algorithm for detection and resolution of generalized deadlocks in distributed systems. Srinivasan, Selvaraj; Rajaram, R. Report Dec 1, 2011 7973
Password apathy. O'Rourke, Morgan Brief article Dec 1, 2011 202
High tech, high risk: the evolution and impact of cybercrime. Brief article Oct 1, 2011 237
The digital threat: cyberattacks put critical infrastructure under fire. George, Torsten Oct 1, 2011 1279
The cost of compliance: protection from cyberattacks does not come cheap. Schou, Eric Oct 1, 2011 506
The coverage question: your guide to selecting cyber-insurance. Rapoport, Gregg A.; Lam, David Oct 1, 2011 1107
Cybersecurity in the private sector: the nations businesses manage a significant share of online activity related to national security and must play a larger role in ensuring the overall integrity of the system. Etzioni, Amitai Sep 22, 2011 3234
Penetration testing: hacking made ethical to test system security. Boteanu, Daniel Sep 22, 2011 1324
Tech data, please; tech data rights, competition, and affordable sustainment. Gallop, David L. Sep 1, 2011 1617
Location privacy: who protects? Cottrill, Caitlin D. Report Jul 1, 2011 8078
Total privacy and absolute disclosure in the blogosphere: how anonymous courtesan blogs reveal all and why. Kozhan, Marian Report Jul 1, 2011 1353
An empirical study of factors affecting electronic commerce adoption among SMEs in Malaysia/Veiksniu, turinciu itakos elektorinei prekybai, studija: Malaizijos pavyzdys. Alam, Syed Shah; Ali, Md. Yunus; Jani, Mohd. Fauzi Mohd. Report Jun 1, 2011 11018
Information security activities of college students: an exploratory study. Mensch, Scott; Wilkie, LeAnn May 19, 2011 10622
Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies. Prestigiacomo, Jennifer May 1, 2011 1930
The power of aggressive analytics: if your bank aspires to be more customer-centric, you need to bulk up to a more muscular analytics approach. That means bolstering your method for securing and integrating data; upgrading your analytics capabilities; and applying more effective measurements to your marketing mix. Castro, Carlos May 1, 2011 2150
Report examines potential risks of privacy and security breaches of personal health data. Apr 1, 2011 395
Editors' introduction to the special issue on autonomic and self-adaptive systems. Camara, Javier; Cuesta, Carlos; Perez-Toledano, Miguel Angel Editorial Mar 1, 2011 957
An aspect-oriented approach for supporting autonomic reconfiguration of software architectures. Costa-Soria, Cristobal; Perez, Jennifer; Carsi, Jose Angel Report Mar 1, 2011 9808
An identity-based mediated signature scheme without trusted PKG. Wang, Xiaofeng; Wang, Shangping Report Mar 1, 2011 7094
Resource control and estimation based fair allocation (EBFA) in heterogeneous active networks. Devi, K. Vimala; Thangaraj, C.; Mehata, K.M. Report Mar 1, 2011 7750
Afghan Mission Network. Heininger, Claire Jan 1, 2011 403
Personal and regulatory data protection in Ukraine. Report Jan 1, 2011 1821
Mastering the art of Wiki: understanding social networking and national security. Carafano, James Jay Jan 1, 2011 5036
Risks of advanced persistent threats and defense against them. Smiraus, Michal; Jasek, Roman Report Jan 1, 2011 1617
Stolen data and fraud: the Hannaford Brothers data breach.(Instructor's Note) Clapper, Danial L. Case study Dec 15, 2010 6023
Stolen data and fraud: the Hannaford Brothers data breach. Clapper, Danial L. Case study Dec 1, 2010 4035
Enhancing DDoS flood attack detection via intelligent fuzzy logic. Xia, Zhengmin; Lu, Songnian; Li, Jianhua; Tang, Junhua Report Dec 1, 2010 6741
Multisignature scheme based on discrete logarithms in the plain public key model. Shao, Zuhua Report Dec 1, 2010 6115
An investigation and extension of a hyper-heuristic framework. Rattadilok, Prapa Report Dec 1, 2010 8718
Rein in and rethink the use of recall rosters. Schmith, Michelle Case study Oct 1, 2010 584
Build and operate a trusted GIG. List Oct 1, 2010 1667
R&M's Cabling Innovations Enhances Uptime and Security for the Middle East Finance Sector. Sep 5, 2010 603
Avoid being the next data-security-breach headline: while larger budgets provide healthcare managers with unique opportunities for technology advancements, few people are paying attention to their largest data security weakness--old IT. Kegley, Jim Sep 1, 2010 1276
Is your it security compromising your IP? There's no doubt that technology has transformed the way in which pharmaceutical companies do business. Rapid development in the digital sphere means that organizations can access expertise across the globe, share research and store data from multiple projects. Horton, Rob Sep 1, 2010 506
Modern quantum technologies of information security against cyber-terrorist attacks/Nformacijos sauguma uztikrinancios moderniosios kvantines technologijos, nukreiptos pries kompiuteriniu teroristu atakas. Korchenko, Oleksandr; Vasiliu, Yevhen; Gnatyuk, Sergiy Report Jun 1, 2010 8463
Matching recordings with needs. Read, Brendan May 1, 2010 2225
Resembling 'cartels,' Hackers become more industrialized. Mar 1, 2010 369
U.S.: EU Vote on Money Transfer Data 'Blow to Security'. Brief article Feb 20, 2010 89
DS/IRM team wins information assurance award. Brief article Feb 1, 2010 236
Client portals: a secure alternative to e-mail: sending clients their tax returns via e-mail may soon no longer be an option. DeFelice, Alexandra Feb 1, 2010 1702
Imperva reveals Top 10 weak password (list). Brief article Jan 22, 2010 139
Encryption strategies in databases. Boicea, Alexandru; Ghita, Vlad; Radulescu, Florin; Sarbu, Anca Daniela Report Jan 1, 2010 1281
Hidden information with infraredesign. Ziljak Vujic, Jana; Ziljak Stanimirovic, Ivana; Pogarcic, Ivan Report Jan 1, 2010 1647
Securing the client-server communication in WCF. Palka, Jan; Palka, Jiri; Motyl, Ivo Report Jan 1, 2010 1292
Security measures in virtual laboratory of microprocessor technology. Dulik, Tomas; Bliznak, Michal Report Jan 1, 2010 1420
Security analysis of UAV radio communication system/Bepilociu orlaiviu radijo rysio sistemos analize. Rudinskas, Darius; Goraj, Zdobyslaw; Stankunas, Jonas Report Dec 1, 2009 2671
Organized security: to address compliance and it security, Piedmont Healthcare chose to establish baseline metrics for it security risk. Cover story Dec 1, 2009 1543
Client data security for the tax practitioner. Black, Barton Sep 1, 2009 2136
Data lockdown? How institutions are answering the national call for better cybersecurity. McClure, Ann Cover story Sep 1, 2009 1871
IT security is even more important in a recession. McLean, Michael R. Jul 3, 2009 408
Data breaches, malware attacks on rise. Jul 1, 2009 438
FBI and US Marshals networks hit by virus. Brief article May 21, 2009 100
Data security, privacy, and identity theft: the economics behind the policy debates. Roberds, William; Schreft, Stacey L. Mar 22, 2009 6718
UPDATE: Congress drafting bill to protect users from targeted ads. Brief article Mar 13, 2009 183
Editorial: special issue on multimedia information system security. Lian, S.; Kanellopoulos, D.; Ruffo, G. Editorial Mar 1, 2009 1627
Recent advances in multimedia information system security. Lian, Shiguo; Kanellopoulos, Dimitris; Ruffo, Giancarlo Report Mar 1, 2009 16575
Detection of stego anomalies in images exploiting the content independent statistical footprints of the steganograms. Geetha, S.; Sindhu, Siva S. Sivatha; Kamaraj, N. Report Mar 1, 2009 10177
Visual security assessment for cipher-images based on neighborhood similarity. Yao, Ye; Xu, Zhengquan; Sun, Jing Report Mar 1, 2009 5139
New ISACA business model. Feb 1, 2009 331
IT security. Feb 1, 2009 358
Top-secret files sold with camera. Brief article Jan 1, 2009 129
Chinese hackers crack White House network. Brief article Jan 1, 2009 191
Teaching the Ishikawa's "fishbone" as a planning tool: responsibility and action planning matrices applied to airport security and network security. Parayitam, Satyanarayana; Desai, Kiran; Desai, Mayur S.; Eason, Mary K. Report Jan 1, 2009 6545
Engineering human security. Guba, Robert Dec 1, 2008 662
Safe and secure: a whole-disk encryption solution safeguards laptop data and simplifies data security management for a pediatric system. Dec 1, 2008 1547
Protect data from employees. Nov 1, 2008 476
Route analytics keeps power on: end-to-end visibility into its critical Layer 3 infrastructure protects utility's data. Henthorn-Iwane, Alex Nov 1, 2008 605
It's better to be safe ... backup devices help prevent crucial data loss. Donaldson, Sonya A. Nov 1, 2008 415
UK academics turn off tap of online data. Oct 1, 2008 405
Law Enforcement Online. Oct 1, 2008 388
Five data validation cases. Simkin, Mark G. Report Sep 22, 2008 3551
Hacker leaks six million Chilean private records. Swartz, Nikki Brief article Sep 1, 2008 108
Spam, cybercrime linked (duh!). Brief article Sep 1, 2008 307
The biggest threat: end-users: education, processes and technology can help alleviate insider security issues. Wittig, Mike Sep 1, 2008 572
Lock it down: Laptop Security requires multiple strategies. Holl, Suzanne M. Sep 1, 2008 753
"Self-service" storage: has its moment arrived? Hough, Geoff Aug 1, 2008 1547
Information security forum lays out vision. Brief article Aug 1, 2008 195
Penetration testing: why franchise systems need information security: regular penetration testing of applications and system security are necessities which will help mitigate the risk of a data breach and system compromises. Chan, Henfree; Schaeffer, Bruce S. Aug 1, 2008 1954
Calming the data storm: a risk management model for mitigating risks: using a risk-based approach for prioritizing efforts to mitigate the greatest information risks is a smart way to alleviate the common problems of limited staff, time, and budget. Rush, Michelle; Vednere, Ganesh Jul 1, 2008 3256
Data Safety Monitoring Boards: what role do they play in clinical research? Cronin, Valerie Brief article Jul 1, 2008 228
Lock the network's back door: secure remote-management appliances provide visibility and control, even during a network outage. Cox, Barry Jul 1, 2008 555
Management tool: AFSO21 Continuous Process Improvement. Henderson, Dan Jun 22, 2008 1502
Managing Knowledge Security. Brief article May 1, 2008 224
Computer security: enabling the digital lifestyle. O'Dell, Robert May 1, 2008 1247
The federated advantage: data exchange between healthcare organizations in RHIOs is a hot topic. Can federated models end the debate? Hurd, Andy Apr 1, 2008 1982
Keeping an eye on the network: campuses deploy network access control to protect users and the network. Powers, Vicki Mar 1, 2008 2685
Security role is evolving. Feb 1, 2008 295
The myths of e-mail governance. Jan 1, 2008 351
Security brought to light: IPSec VPN provides users with either Web-delivered "thin client" or clientless browser access. Jan 1, 2008 806
Securing Data 101. Swartz, Nikki Jan 1, 2008 369
Information security standards: the 10 keys to protecting your network. Lindenmayer, Gerhard Dec 1, 2007 745
Documentation, recordkeeping and risk management. Vaughn, Lisa D. Report Dec 1, 2007 2476
U.S. government secrecy on the rise. Swartz, Nikki Nov 1, 2007 363
CARS update. Oct 1, 2007 794
VP challenges classified data order. Swartz, Nikki Sep 1, 2007 551
Security and outsourcing: negotiate early. Wagley, John Aug 1, 2007 589
Data Disaster? Brief article Aug 1, 2007 84
VistA modernization concerns. Brief article Aug 1, 2007 232
Keeping secrets: how to protect your computer form snoops and spies. Callahan, Theo Jul 1, 2007 1400
Reactive vs. proactive security. Chesla, Avi Jul 1, 2007 611
Is critical data protected? Vosburgh, Craig Jun 1, 2007 503
Defending against hacks. Rothke, Ben Brief article Jun 1, 2007 255
Safeguarding and monitoring data transmission: a Honolulu-based healthcare enterprise safeguards against confidential data leaks. Brown, E. Victor Mar 1, 2007 1455
Infosecurity Europe 2007: a selection of papers from exhibitors at Infosecurity Europe 2007, Europe's dedicated information security event. Now in its 12th year, providing an education programme, new products & services, over 300 exhibitors and 11,600 visitors from every segment of the industry. 24th - 26th April 2007, grand hall, Olympia. Mar 1, 2007 6088
Could fax be the weak link in your security chain? Huff, Phil Feb 1, 2007 861
CDP--buzz versus benefit. Roudebush, Bob Jan 1, 2007 1556
ISO 27001 risk management and compliance. Brenner, Joel Jan 1, 2007 1852
Securing the network for industrial infrastructure. Truican, Ion; Dan, Stefan; Kristaly, Dominic Mircea; Bujdei, Catalin Jan 1, 2007 2091
Symantec introduces online Security Awareness Center. Brief article Nov 29, 2006 205
Super Power Passwords--the threat from within. Macleod, Calum Nov 1, 2006 474
Hunting for leaks. Brief article Nov 1, 2006 197
New Rules for electronic discovery. Boehning, H. Christopher; Twiste, Eric Nov 1, 2006 663
An intelligent approach to application security. Moyle, Steve Oct 1, 2006 1710
Another hidden enemy in Iraq. Gips, Michael A. Brief article Sep 1, 2006 268
Taking hurricane lessons to the bank. Gips, Michael A. Brief article Sep 1, 2006 238
Growing threat to online applications. Piazza, Peter Sep 1, 2006 372
New Hampshire mandates data breach notification: a new law requires any business in N.H. to notify those individuals affected by any security breach of unencrypted computer data that contains personal information. Hollinger, Susan Aug 18, 2006 591
Protecting data in the mobile business universe. Aug 4, 2006 509
Crime wave. Hewitt, Janet Reilley Aug 1, 2006 521
Open secrets: classification overkill. Sullum, Jacob Aug 1, 2006 318
Telecommute safely: use Internet technology to keep cost down. Davis, James P. Aug 1, 2006 1735
VA to provide free credit monitoring. Brief article Aug 1, 2006 272
Data breach a growing concern for insurance application process. Dankwa, David Aug 1, 2006 748
To encrypt or not to encrypt? That is the question. Piazza, Peter Aug 1, 2006 588
The metrics system. Brief article Aug 1, 2006 98
GIS--an invaluable tool for oil & gas. Cobbs, Dwayne Discussion Aug 1, 2006 2789
Shorten the problem lifecycle. Haggerty, Eileen Aug 1, 2006 595
Sophos claims Macs remain the safer option for computer users. Brief article Jul 5, 2006 216
Avoiding the 'phishing' hook: new online scares and virus attacks undermine your business. McCrea, Bridget Jul 1, 2006 332
Copy that: thinking outside the (backup) box. Needleman, Ted Jul 1, 2006 1143
Skip this article: (if you don't back up your computer): a few mouse clicks can save your data. Petravick, Simon Jun 1, 2006 1972
How not to hate your computer: create an efficient office tool. Zarowin, Stanley Jun 1, 2006 1971
Securing mortgage documents in an online world--from origination to funding. Phillips, Judson Jun 1, 2006 1254
Cyber security: pay now or pay later. Schwab, Robert Editorial Jun 1, 2006 525
The Semantic Web. Lassila, Ora Jun 1, 2006 4420
Ransom Trojan horse demands money with menaces. Jun 1, 2006 378
Fantasy football formula virus. Brief article Jun 1, 2006 194
Poor reporting hampering board's confidence in security provision. Jun 1, 2006 334
Think before you send you can prevent e-mail disasters and protect confidential information by securing your systems. Zambroski, Ray May 1, 2006 1820
Information Overload? May 1, 2006 323
Taking steps to ensure CRM data security. Seitz, Ken May 1, 2006 2060
Managed services taking hold. May 1, 2006 548
Combine the best security options: managed security offerings target threats where they are best defeated. Ferro, Mitch May 1, 2006 1474
Yahoo Japan Net shopping firm data leaked onto Internet. Brief article Mar 27, 2006 125
DHS improves its infosec. Piazza, Peter Brief Article Jan 1, 2006 196
ScanSafe claims online chat poses workplace security risk. Brief Article Dec 16, 2005 193
BT warns consumers unwilling to pay for best PC security. Brief Article Nov 24, 2005 168
Weaving a safety net: go beyond firewalls and content filters to soup up network protection--without busting your budget. Millard, Elizabeth Nov 1, 2005 2249
Security by the book. Oct 10, 2005 1155
What can be done to increase info security? Brief Article Oct 1, 2005 204
ISF reports Trojan attacks to increase in Europe/US. Sep 28, 2005 222
RSA Security survey reveals password management challenges. Brief Article Sep 28, 2005 240
European Center addresses cyber security. Brief Article Sep 22, 2005 167
Risk managers' role grows along with theft threats. Green, Meg Sep 1, 2005 393
UK public ignorant of online threats - report. Brief Article Aug 29, 2005 209
Perimeterless security in action. Aug 10, 2005 1041
Security, privacy top tech concerns for businesses. Aug 8, 2005 342
Of data security and tea sandwiches. Schelmetic, Tracey E. Editorial Aug 1, 2005 806
Sophos emphasises importance of computer security as confidential nuclear information is leaked by a virus. Brief Article Jun 24, 2005 159
The security conundrum. Jun 10, 2005 369
Security: Good intentions. Jun 10, 2005 1626
Wireless lockdown. Jun 10, 2005 893
Healthy computing: feed your computer a steady diet of secure software. Bradley, Susan May 1, 2005 632
Data security in crisis. O'Rourke, Morgan May 1, 2005 484
A sense of security. Apr 10, 2005 693
Preventing computer fraud: enemies from without and within are constantly looking for ways to break into vulnerable computer systems. All it takes is one successful attack to bring down an entire system. Hanna, Greg Mar 1, 2005 2494
DHS cybersecurity. Piazza, Peter Brief Article Feb 1, 2005 157
Watching your back (up): prevent your data from disappearing. Needleman, Ted Feb 1, 2005 1908
Privacy grows into a hot nonprofit topic. Ford, Robert Jan 1, 2005 2659
Does IT security myth the point? Information security programs often fail because they are based on myths and misconceptions. Landoll, Doug Jan 1, 2005 807
Common Criteria: a prime factor in information security for the DoD. Malnick, Kathy Jan 1, 2005 2231
Beating the cyber threat: CEOs must invest in a new generation of IT. Khosla, Pradeep K. Dec 1, 2004 1235
Function over form: Many crimes blur the distinction between the physical and the data worlds. Security departments need to do likewise. Rakow, Joel Dec 1, 2004 1978
When insiders go outside the lines: for all the money companies have spent to secure their networks' outside perimeters against hackers and viruses, the problems posed by employees and other insiders may not be getting enough attention. Marshall, Jeffrey Dec 1, 2004 1883
Keep your computer system safe. Nov 29, 2004 397
Overcoming recovery barriers: rapid and reliable system and data recovery. Spencer, Susie Nov 1, 2004 1204
The paradox of distance in business continuance. Hadipour, Mehran Nov 1, 2004 1359
Addressing power and thermal challenges in the datacenter. Wagner, Dave Nov 1, 2004 1780
Intelligence is the best defense: a public-private group that provides intelligence to the financial services sector has revamped operations to adapt to new security challenges. Piazza, Peter Sep 1, 2004 4208
Tracking the cybercrime trail: in addition to knowing how to follow the bits of evidence, forensic detectives must know how to work with law enforcement. Sartin, Bryan Sep 1, 2004 2908
Using SPAM firewalls. Sep 1, 2004 678
Protecting your intellectual property. Romej, Carol Sep 1, 2004 585
The weak link in IT security: what good is cutting-edge network security if your own employees sabotage the system by mistake? Wade, Jared Jul 1, 2004 2570
The five pillars of information security. Ameri, Amir Jul 1, 2004 712
Mobile content management: is it wireless's own pain point? Reardon, Aaron Jun 1, 2004 1404
Web hosting firm finds niche in data storage. Louiseize, Kelly Jun 1, 2004 448
Assessing your storage and backup for regulatory compliance. Barth, Ken May 1, 2004 1762
Secure networks: changing business models and complexity of threats force new approaches to network security. Pollock, Roark Apr 1, 2004 1146
Getting a better handle on incidents. Piazza, Peter Brief Article Apr 1, 2004 209
Storage and security: why storage solutions and data security must go hand-in-hand. Moore, Fred Mar 1, 2004 1568
Re-generating storage demand in 2004. Moore, Fred Feb 1, 2004 873
Guarding the virtual vault: businesses in all sectors now recognize the value of information. Unfortunately, so do criminals. Data theft has become a multi-billion dollar problem that no company can afford to ignore. Stoller, Jacob Feb 1, 2004 1254
Move beyond patch management: correlation threat-management engines can reduce the time needed to check syslog files. Hollows, Phil Jan 1, 2004 1130
Identity theft: threat to corporate reputation; Companies that are aggressive in protecting their customers will enjoy enhanced brand awareness. Pearson, Harriet Jan 1, 2004 743
SAIC wins DEA contract. Dec 8, 2003 355
Making sensible investments in security. Gossels, Jonathan Dec 1, 2003 1694
Think strategically, act tactically in 2004: how will your company master the ten biggest challenges? Moore, Fred Dec 1, 2003 1984
A new approach to protecting data: Time Addressable Storage. Wadsworth, Kirby Dec 1, 2003 1177
The security-privacy paradox. Brief Article Nov 1, 2003 169
Computer security. Nelms, Clinton F. Nov 1, 2003 1131
5 hurdles to mobile and wireless deployments ... and how to overcome them: today's work force is demanding mobile, flexible, and real-time access to critical data. But, you're bound to encounter a few potholes along the road to anytime-anywhere computing. Vieraitis, Bob Nov 1, 2003 3278
A different take on Wi-Fi security: instead of just focusing on securing the connection, make smart choices about what parts of your network you make available wirelessly. Barken, Lee Nov 1, 2003 3104

Terms of use | Copyright © 2016 Farlex, Inc. | Feedback | For webmasters