Printer Friendly
The Free Library
22,741,889 articles and books

Browse Data security topic

Management subtopic



1-300 out of 354 article(s) nextnext page
Title Author Type Date Words
Core questions for cyber attack guidance. Rice, Jonathan C. Essay Oct 1, 2013 6644
Unpacking cyberwar: the sufficiency of the law of armed conflict in the cyber domain. Phillips, Kyle Genaro Report Jul 1, 2013 3591
Awaiting cyber 9/11. Magee, Clifford S. Report Jul 1, 2013 4654
Phone data dial in crime network: program mines mobile calls for incriminating patterns. Ehrenberg, Rachel Apr 20, 2013 361
Use of ontologies in mapping of information security requirements/Ontologijos naudojimas informacijos saugumo reikalavimams susieti. Ramanauskaite, Simona; Radvile, Egle; Olifer, Dmitrij Report Apr 1, 2013 1496
Incorporating global information security and assurance in I.S. education. White, Garry L.; Hewitt, Barbara; Kruck, S.E. Report Mar 22, 2013 3763
Information security assessment of SMEs as coursework--learning information security management by doing. Ilvonen, Ilona Report Mar 22, 2013 6390
Preparing information systems (IS) graduates to meet the challenges of global IT security: some suggestions. Sauls, Jeff; Gudigantala, Naveen Report Mar 22, 2013 1913
Hackers, spies, and stolen secrets: protecting law firms from data theft. Ezekiel, Alan W. Mar 22, 2013 9011
The drama continues ... on several fronts. Editorial Mar 1, 2013 528
Getting off the data storage treadmill. Wessels, Tim Nov 30, 2012 527
Data security 101: avoiding the list: healthcare data may be ripe for the picking, and that's causing sleepless nights for many CIOs. Perna, Gabriel Oct 1, 2012 1670
The first steps to managing cyber-risk. Dunbar, Thomas Oct 1, 2012 2339
The international governance framework for cybersecurity. Rosenzweig, Paul Sep 22, 2012 11630
Managing cybersecurity risks: mobile and cloud open doors to opportunities and threats. Drew, Jeff Aug 1, 2012 2838
CPAS prioritize tech security: many unsure how to best leverage emerging trends. Drew, Jeff May 1, 2012 889
Sailing the Cyber Sea. Stavridis, James G.; Parker, Elton C., III Apr 1, 2012 5201
Mitigative counterstriking: self-defense and deterrence in cyberspace. Kesan, Jay P.; Hayes, Carol M. Mar 22, 2012 10957
Mitigative counterstriking: self-defense and deterrence in cyberspace. Kesan, Jay P.; Hayes, Carol M. Mar 22, 2012 13135
Mitigative counterstriking: self-defense and deterrence in cyberspace. Kesan, Jay P.; Hayes, Carol M. Mar 22, 2012 32505
No backup. Robinson, Arthur B. Mar 22, 2012 1164
Shredded documents brought back to life. Beidel, Eric Brief article Mar 1, 2012 279
Computer network security--evolving risks. Schirick, Edward A. Mar 1, 2012 1646
A sustainable information security framework for e-Government--case of Tanzania. Wangwe, Carina Kabajunga; Eloff, Maria Margaretha; Venter, Lucas Case study Mar 1, 2012 6134
Privacy aware recommender service using multi-agent middleware --an IPTV network scenario. Elmisery, Ahmed M.; Botvich, Dmitri Report Mar 1, 2012 12367
Secure key exchange scheme for IPTV broadcasting. Pippal, Ravi Singh; Tapaswi, Shashikala; Jaidhar, C.D. Report Mar 1, 2012 3941
Times limited accountable anonymous online submission control system from single-verifier k-times group signature. Zhao, Xingwen; Zhang, Fangguo Report Mar 1, 2012 6379
Malicious botnet survivability mechanism evolution forecasting by means of a genetic algorithm/Kenkejisku botnet tinklu isgyvenamumo mechanizmu evoliucijos prognozavimas genetinio algoritmo priemonemis. Goranin, Nikolaj; Cenys, Antanas; Juknius, Jonas Report Feb 1, 2012 5009
Composite DoS attack model/Jungtinis DoS ataku modelis. Ramanauskaite, Simona; Cenys, Antanas Report Feb 1, 2012 3876
Techniques for modelling network security/Kompiuteriu sistemu saugumo modeliavimas. Gulbinovic, Lech Report Feb 1, 2012 1752
Cyber security review: as threats proliferate, here are five areas where companies need to strengthen and update their policies and practices. Korolov, Maria Feb 1, 2012 1081
Unsecured mobile devices: the weak link: data breaches are becoming more common and more expensive, according to a recent study. Raths, David Feb 1, 2012 531
SSN reduction plan Phase 1 and 2 results. Muck, Steve Jan 1, 2012 516
Life in the cloud: what exactly is cloud computing? And is it a safe way to store my files? Bertolucci, Jeff Jan 1, 2012 637
Continuous monitoring: protecting the enterprise and executive suite. Taylor, Patrick Jan 1, 2012 1545
Distributed denial of service attack principles and defense mechanisms. Zheng, Ying Report Dec 31, 2011 1663
Message-optimal algorithm for detection and resolution of generalized deadlocks in distributed systems. Srinivasan, Selvaraj; Rajaram, R. Report Dec 1, 2011 7973
Password apathy. O'Rourke, Morgan Brief article Dec 1, 2011 202
High tech, high risk: the evolution and impact of cybercrime. Brief article Oct 1, 2011 237
The digital threat: cyberattacks put critical infrastructure under fire. George, Torsten Oct 1, 2011 1279
The cost of compliance: protection from cyberattacks does not come cheap. Schou, Eric Oct 1, 2011 506
The coverage question: your guide to selecting cyber-insurance. Rapoport, Gregg A.; Lam, David Oct 1, 2011 1107
Cybersecurity in the private sector: the nations businesses manage a significant share of online activity related to national security and must play a larger role in ensuring the overall integrity of the system. Etzioni, Amitai Sep 22, 2011 3234
Penetration testing: hacking made ethical to test system security. Boteanu, Daniel Sep 22, 2011 1324
Tech data, please; tech data rights, competition, and affordable sustainment. Gallop, David L. Sep 1, 2011 1617
Total privacy and absolute disclosure in the blogosphere: how anonymous courtesan blogs reveal all and why. Kozhan, Marian Report Jul 1, 2011 1353
Location privacy: who protects? Cottrill, Caitlin D. Report Jul 1, 2011 8078
An empirical study of factors affecting electronic commerce adoption among SMEs in Malaysia/Veiksniu, turinciu itakos elektorinei prekybai, studija: Malaizijos pavyzdys. Alam, Syed Shah; Ali, Md. Yunus; Jani, Mohd. Fauzi Mohd. Report Jun 1, 2011 11018
Information security activities of college students: an exploratory study. Mensch, Scott; Wilkie, LeAnn May 19, 2011 10622
Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies. Prestigiacomo, Jennifer May 1, 2011 1930
The power of aggressive analytics: if your bank aspires to be more customer-centric, you need to bulk up to a more muscular analytics approach. That means bolstering your method for securing and integrating data; upgrading your analytics capabilities; and applying more effective measurements to your marketing mix. Castro, Carlos May 1, 2011 2150
Report examines potential risks of privacy and security breaches of personal health data. Apr 1, 2011 395
Editors' introduction to the special issue on autonomic and self-adaptive systems. Camara, Javier; Cuesta, Carlos; Perez-Toledano, Miguel Angel Editorial Mar 1, 2011 957
An aspect-oriented approach for supporting autonomic reconfiguration of software architectures. Costa-Soria, Cristobal; Perez, Jennifer; Carsi, Jose Angel Report Mar 1, 2011 9808
An identity-based mediated signature scheme without trusted PKG. Wang, Xiaofeng; Wang, Shangping Report Mar 1, 2011 7094
Resource control and estimation based fair allocation (EBFA) in heterogeneous active networks. Devi, K. Vimala; Thangaraj, C.; Mehata, K.M. Report Mar 1, 2011 7750
Personal and regulatory data protection in Ukraine. Report Jan 1, 2011 1821
Risks of advanced persistent threats and defense against them. Smiraus, Michal; Jasek, Roman Report Jan 1, 2011 1617
Mastering the art of Wiki: understanding social networking and national security. Carafano, James Jay Jan 1, 2011 5036
Afghan Mission Network. Heininger, Claire Jan 1, 2011 403
Stolen data and fraud: the Hannaford Brothers data breach.(Instructor's Note) Clapper, Danial L. Case study Dec 15, 2010 6023
Stolen data and fraud: the Hannaford Brothers data breach. Clapper, Danial L. Case study Dec 1, 2010 4035
Enhancing DDoS flood attack detection via intelligent fuzzy logic. Xia, Zhengmin; Lu, Songnian; Li, Jianhua; Tang, Junhua Report Dec 1, 2010 6741
Multisignature scheme based on discrete logarithms in the plain public key model. Shao, Zuhua Report Dec 1, 2010 6115
An investigation and extension of a hyper-heuristic framework. Rattadilok, Prapa Report Dec 1, 2010 8718
Build and operate a trusted GIG. List Oct 1, 2010 1667
Rein in and rethink the use of recall rosters. Schmith, Michelle Case study Oct 1, 2010 584
R&M's Cabling Innovations Enhances Uptime and Security for the Middle East Finance Sector. Sep 5, 2010 603
Avoid being the next data-security-breach headline: while larger budgets provide healthcare managers with unique opportunities for technology advancements, few people are paying attention to their largest data security weakness--old IT. Kegley, Jim Sep 1, 2010 1276
Is your it security compromising your IP? There's no doubt that technology has transformed the way in which pharmaceutical companies do business. Rapid development in the digital sphere means that organizations can access expertise across the globe, share research and store data from multiple projects. Horton, Rob Sep 1, 2010 506
Modern quantum technologies of information security against cyber-terrorist attacks/Nformacijos sauguma uztikrinancios moderniosios kvantines technologijos, nukreiptos pries kompiuteriniu teroristu atakas. Korchenko, Oleksandr; Vasiliu, Yevhen; Gnatyuk, Sergiy Report Jun 1, 2010 8463
Matching recordings with needs. Read, Brendan May 1, 2010 2225
Resembling 'cartels,' Hackers become more industrialized. Mar 1, 2010 369
U.S.: EU Vote on Money Transfer Data 'Blow to Security'. Brief article Feb 20, 2010 89
Client portals: a secure alternative to e-mail: sending clients their tax returns via e-mail may soon no longer be an option. DeFelice, Alexandra Feb 1, 2010 1702
DS/IRM team wins information assurance award. Brief article Feb 1, 2010 236
Imperva reveals Top 10 weak password (list). Brief article Jan 22, 2010 139
Encryption strategies in databases. Boicea, Alexandru; Ghita, Vlad; Radulescu, Florin; Sarbu, Anca Daniela Report Jan 1, 2010 1281
Hidden information with infraredesign. Ziljak Vujic, Jana; Ziljak Stanimirovic, Ivana; Pogarcic, Ivan Report Jan 1, 2010 1647
Securing the client-server communication in WCF. Palka, Jan; Palka, Jiri; Motyl, Ivo Report Jan 1, 2010 1292
Security measures in virtual laboratory of microprocessor technology. Dulik, Tomas; Bliznak, Michal Report Jan 1, 2010 1420
Organized security: to address compliance and it security, Piedmont Healthcare chose to establish baseline metrics for it security risk. Cover story Dec 1, 2009 1543
Security analysis of UAV radio communication system/Bepilociu orlaiviu radijo rysio sistemos analize. Rudinskas, Darius; Goraj, Zdobyslaw; Stankunas, Jonas Report Dec 1, 2009 2671
Client data security for the tax practitioner. Black, Barton Sep 1, 2009 2136
Data lockdown? How institutions are answering the national call for better cybersecurity. McClure, Ann Cover story Sep 1, 2009 1871
IT security is even more important in a recession. McLean, Michael R. Jul 3, 2009 408
Data breaches, malware attacks on rise. Jul 1, 2009 438
FBI and US Marshals networks hit by virus. Brief article May 21, 2009 100
Data security, privacy, and identity theft: the economics behind the policy debates. Roberds, William; Schreft, Stacey L. Mar 22, 2009 6718
UPDATE: Congress drafting bill to protect users from targeted ads. Brief article Mar 13, 2009 183
Editorial: special issue on multimedia information system security. Lian, S.; Kanellopoulos, D.; Ruffo, G. Editorial Mar 1, 2009 1627
Recent advances in multimedia information system security. Lian, Shiguo; Kanellopoulos, Dimitris; Ruffo, Giancarlo Report Mar 1, 2009 16575
Detection of stego anomalies in images exploiting the content independent statistical footprints of the steganograms. Geetha, S.; Sindhu, Siva S. Sivatha; Kamaraj, N. Report Mar 1, 2009 10177
Visual security assessment for cipher-images based on neighborhood similarity. Yao, Ye; Xu, Zhengquan; Sun, Jing Report Mar 1, 2009 5139
New ISACA business model. Feb 1, 2009 331
IT security. Feb 1, 2009 358
Top-secret files sold with camera. Brief article Jan 1, 2009 129
Chinese hackers crack White House network. Brief article Jan 1, 2009 191
Teaching the Ishikawa's "fishbone" as a planning tool: responsibility and action planning matrices applied to airport security and network security. Parayitam, Satyanarayana; Desai, Kiran; Desai, Mayur S.; Eason, Mary K. Report Jan 1, 2009 6545
Engineering human security. Guba, Robert Dec 1, 2008 662
Safe and secure: a whole-disk encryption solution safeguards laptop data and simplifies data security management for a pediatric system. Dec 1, 2008 1547
It's better to be safe ... backup devices help prevent crucial data loss. Donaldson, Sonya A. Nov 1, 2008 415
Protect data from employees. Nov 1, 2008 476
Route analytics keeps power on: end-to-end visibility into its critical Layer 3 infrastructure protects utility's data. Henthorn-Iwane, Alex Nov 1, 2008 605
Law Enforcement Online. Oct 1, 2008 388
UK academics turn off tap of online data. Oct 1, 2008 405
Five data validation cases. Simkin, Mark G. Report Sep 22, 2008 3551
Hacker leaks six million Chilean private records. Swartz, Nikki Brief article Sep 1, 2008 108
Spam, cybercrime linked (duh!). Brief article Sep 1, 2008 307
The biggest threat: end-users: education, processes and technology can help alleviate insider security issues. Wittig, Mike Sep 1, 2008 572
Lock it down: Laptop Security requires multiple strategies. Holl, Suzanne M. Sep 1, 2008 753
Penetration testing: why franchise systems need information security: regular penetration testing of applications and system security are necessities which will help mitigate the risk of a data breach and system compromises. Chan, Henfree; Schaeffer, Bruce S. Aug 1, 2008 1954
"Self-service" storage: has its moment arrived? Hough, Geoff Aug 1, 2008 1547
Information security forum lays out vision. Brief article Aug 1, 2008 195
Calming the data storm: a risk management model for mitigating risks: using a risk-based approach for prioritizing efforts to mitigate the greatest information risks is a smart way to alleviate the common problems of limited staff, time, and budget. Rush, Michelle; Vednere, Ganesh Jul 1, 2008 3256
Lock the network's back door: secure remote-management appliances provide visibility and control, even during a network outage. Cox, Barry Jul 1, 2008 555
Data Safety Monitoring Boards: what role do they play in clinical research? Cronin, Valerie Brief article Jul 1, 2008 228
Management tool: AFSO21 Continuous Process Improvement. Henderson, Dan Jun 22, 2008 1502
Managing Knowledge Security. Brief article May 1, 2008 224
Computer security: enabling the digital lifestyle. O'Dell, Robert May 1, 2008 1247
The federated advantage: data exchange between healthcare organizations in RHIOs is a hot topic. Can federated models end the debate? Hurd, Andy Apr 1, 2008 1982
Keeping an eye on the network: campuses deploy network access control to protect users and the network. Powers, Vicki Mar 1, 2008 2685
Security role is evolving. Feb 1, 2008 295
The myths of e-mail governance. Jan 1, 2008 351
Security brought to light: IPSec VPN provides users with either Web-delivered "thin client" or clientless browser access. Jan 1, 2008 806
Securing Data 101. Swartz, Nikki Jan 1, 2008 369
Information security standards: the 10 keys to protecting your network. Lindenmayer, Gerhard Dec 1, 2007 745
Documentation, recordkeeping and risk management. Vaughn, Lisa D. Report Dec 1, 2007 2476
U.S. government secrecy on the rise. Swartz, Nikki Nov 1, 2007 363
CARS update. Oct 1, 2007 794
VP challenges classified data order. Swartz, Nikki Sep 1, 2007 551
VistA modernization concerns. Brief article Aug 1, 2007 232
Security and outsourcing: negotiate early. Wagley, John Aug 1, 2007 589
Data Disaster? Brief article Aug 1, 2007 84
Keeping secrets: how to protect your computer form snoops and spies. Callahan, Theo Jul 1, 2007 1400
Reactive vs. proactive security. Chesla, Avi Jul 1, 2007 611
Defending against hacks. Rothke, Ben Brief article Jun 1, 2007 255
Is critical data protected? Vosburgh, Craig Jun 1, 2007 503
Safeguarding and monitoring data transmission: a Honolulu-based healthcare enterprise safeguards against confidential data leaks. Brown, E. Victor Mar 1, 2007 1455
Infosecurity Europe 2007: a selection of papers from exhibitors at Infosecurity Europe 2007, Europe's dedicated information security event. Now in its 12th year, providing an education programme, new products & services, over 300 exhibitors and 11,600 visitors from every segment of the industry. 24th - 26th April 2007, grand hall, Olympia. Mar 1, 2007 6088
Could fax be the weak link in your security chain? Huff, Phil Feb 1, 2007 861
ISO 27001 risk management and compliance. Brenner, Joel Jan 1, 2007 1852
CDP--buzz versus benefit. Roudebush, Bob Jan 1, 2007 1556
Securing the network for industrial infrastructure. Truican, Ion; Dan, Stefan; Kristaly, Dominic Mircea; Bujdei, Catalin Jan 1, 2007 2091
Symantec introduces online Security Awareness Center. Brief article Nov 29, 2006 205
Super Power Passwords--the threat from within. Macleod, Calum Nov 1, 2006 474
Hunting for leaks. Brief article Nov 1, 2006 197
New Rules for electronic discovery. Boehning, H. Christopher; Twiste, Eric Nov 1, 2006 663
An intelligent approach to application security. Moyle, Steve Oct 1, 2006 1710
Another hidden enemy in Iraq. Gips, Michael A. Brief article Sep 1, 2006 268
Taking hurricane lessons to the bank. Gips, Michael A. Brief article Sep 1, 2006 238
Growing threat to online applications. Piazza, Peter Sep 1, 2006 372
New Hampshire mandates data breach notification: a new law requires any business in N.H. to notify those individuals affected by any security breach of unencrypted computer data that contains personal information. Hollinger, Susan Aug 18, 2006 591
Protecting data in the mobile business universe. Aug 4, 2006 509
Crime wave. Hewitt, Janet Reilley Aug 1, 2006 521
Shorten the problem lifecycle. Haggerty, Eileen Aug 1, 2006 595
Open secrets: classification overkill. Sullum, Jacob Aug 1, 2006 318
Telecommute safely: use Internet technology to keep cost down. Davis, James P. Aug 1, 2006 1735
VA to provide free credit monitoring. Brief article Aug 1, 2006 272
Data breach a growing concern for insurance application process. Dankwa, David Aug 1, 2006 748
To encrypt or not to encrypt? That is the question. Piazza, Peter Aug 1, 2006 588
The metrics system. Brief article Aug 1, 2006 98
GIS--an invaluable tool for oil & gas. Cobbs, Dwayne Discussion Aug 1, 2006 2789
Sophos claims Macs remain the safer option for computer users. Brief article Jul 5, 2006 216
Avoiding the 'phishing' hook: new online scares and virus attacks undermine your business. McCrea, Bridget Jul 1, 2006 332
Copy that: thinking outside the (backup) box. Needleman, Ted Jul 1, 2006 1143
Skip this article: (if you don't back up your computer): a few mouse clicks can save your data. Petravick, Simon Jun 1, 2006 1972
How not to hate your computer: create an efficient office tool. Zarowin, Stanley Jun 1, 2006 1971
Securing mortgage documents in an online world--from origination to funding. Phillips, Judson Jun 1, 2006 1254
Cyber security: pay now or pay later. Schwab, Robert Editorial Jun 1, 2006 525
The Semantic Web. Lassila, Ora Jun 1, 2006 4420
Ransom Trojan horse demands money with menaces. Jun 1, 2006 378
Fantasy football formula virus. Brief article Jun 1, 2006 194
Poor reporting hampering board's confidence in security provision. Jun 1, 2006 334
Think before you send you can prevent e-mail disasters and protect confidential information by securing your systems. Zambroski, Ray May 1, 2006 1820
Information Overload? May 1, 2006 323
Taking steps to ensure CRM data security. Seitz, Ken May 1, 2006 2060
Managed services taking hold. May 1, 2006 548
Combine the best security options: managed security offerings target threats where they are best defeated. Ferro, Mitch May 1, 2006 1474
Yahoo Japan Net shopping firm data leaked onto Internet. Brief article Mar 27, 2006 125
DHS improves its infosec. Piazza, Peter Brief Article Jan 1, 2006 196
ScanSafe claims online chat poses workplace security risk. Brief Article Dec 16, 2005 193
BT warns consumers unwilling to pay for best PC security. Brief Article Nov 24, 2005 168
Weaving a safety net: go beyond firewalls and content filters to soup up network protection--without busting your budget. Millard, Elizabeth Nov 1, 2005 2249
Security by the book. Oct 10, 2005 1155
What can be done to increase info security? Brief Article Oct 1, 2005 204
ISF reports Trojan attacks to increase in Europe/US. Sep 28, 2005 222
RSA Security survey reveals password management challenges. Brief Article Sep 28, 2005 240
European Center addresses cyber security. Brief Article Sep 22, 2005 167
Risk managers' role grows along with theft threats. Green, Meg Sep 1, 2005 393
UK public ignorant of online threats - report. Brief Article Aug 29, 2005 209
Perimeterless security in action. Aug 10, 2005 1041
Security, privacy top tech concerns for businesses. Aug 8, 2005 342
Of data security and tea sandwiches. Schelmetic, Tracey E. Editorial Aug 1, 2005 806
Sophos emphasises importance of computer security as confidential nuclear information is leaked by a virus. Brief Article Jun 24, 2005 159
The security conundrum. Jun 10, 2005 369
Security: Good intentions. Jun 10, 2005 1626
Wireless lockdown. Jun 10, 2005 893
Healthy computing: feed your computer a steady diet of secure software. Bradley, Susan May 1, 2005 632
Data security in crisis. O'Rourke, Morgan May 1, 2005 484
A sense of security. Apr 10, 2005 693
Preventing computer fraud: enemies from without and within are constantly looking for ways to break into vulnerable computer systems. All it takes is one successful attack to bring down an entire system. Hanna, Greg Mar 1, 2005 2494
DHS cybersecurity. Piazza, Peter Brief Article Feb 1, 2005 157
Watching your back (up): prevent your data from disappearing. Needleman, Ted Feb 1, 2005 1908
Does IT security myth the point? Information security programs often fail because they are based on myths and misconceptions. Landoll, Doug Jan 1, 2005 807
Common Criteria: a prime factor in information security for the DoD. Malnick, Kathy Jan 1, 2005 2231
Privacy grows into a hot nonprofit topic. Ford, Robert Jan 1, 2005 2659
Beating the cyber threat: CEOs must invest in a new generation of IT. Khosla, Pradeep K. Dec 1, 2004 1235
Function over form: Many crimes blur the distinction between the physical and the data worlds. Security departments need to do likewise. Rakow, Joel Dec 1, 2004 1978
When insiders go outside the lines: for all the money companies have spent to secure their networks' outside perimeters against hackers and viruses, the problems posed by employees and other insiders may not be getting enough attention. Marshall, Jeffrey Dec 1, 2004 1883
Keep your computer system safe. Nov 29, 2004 397
Overcoming recovery barriers: rapid and reliable system and data recovery. Spencer, Susie Nov 1, 2004 1204
The paradox of distance in business continuance. Hadipour, Mehran Nov 1, 2004 1359
Addressing power and thermal challenges in the datacenter. Wagner, Dave Nov 1, 2004 1780
Protecting your intellectual property. Romej, Carol Sep 1, 2004 585
Intelligence is the best defense: a public-private group that provides intelligence to the financial services sector has revamped operations to adapt to new security challenges. Piazza, Peter Sep 1, 2004 4208
Tracking the cybercrime trail: in addition to knowing how to follow the bits of evidence, forensic detectives must know how to work with law enforcement. Sartin, Bryan Sep 1, 2004 2908
Using SPAM firewalls. Sep 1, 2004 678
The weak link in IT security: what good is cutting-edge network security if your own employees sabotage the system by mistake? Wade, Jared Jul 1, 2004 2570
The five pillars of information security. Ameri, Amir Jul 1, 2004 712
Mobile content management: is it wireless's own pain point? Reardon, Aaron Jun 1, 2004 1404
Web hosting firm finds niche in data storage. Louiseize, Kelly Jun 1, 2004 448
Assessing your storage and backup for regulatory compliance. Barth, Ken May 1, 2004 1762
Secure networks: changing business models and complexity of threats force new approaches to network security. Pollock, Roark Apr 1, 2004 1146
Getting a better handle on incidents. Piazza, Peter Brief Article Apr 1, 2004 209
Storage and security: why storage solutions and data security must go hand-in-hand. Moore, Fred Mar 1, 2004 1568
Re-generating storage demand in 2004. Moore, Fred Feb 1, 2004 873
Guarding the virtual vault: businesses in all sectors now recognize the value of information. Unfortunately, so do criminals. Data theft has become a multi-billion dollar problem that no company can afford to ignore. Stoller, Jacob Feb 1, 2004 1254
Identity theft: threat to corporate reputation; Companies that are aggressive in protecting their customers will enjoy enhanced brand awareness. Pearson, Harriet Jan 1, 2004 743
Move beyond patch management: correlation threat-management engines can reduce the time needed to check syslog files. Hollows, Phil Jan 1, 2004 1130
SAIC wins DEA contract. Dec 8, 2003 355
Making sensible investments in security. Gossels, Jonathan Dec 1, 2003 1694
Think strategically, act tactically in 2004: how will your company master the ten biggest challenges? Moore, Fred Dec 1, 2003 1984
A new approach to protecting data: Time Addressable Storage. Wadsworth, Kirby Dec 1, 2003 1177
5 hurdles to mobile and wireless deployments ... and how to overcome them: today's work force is demanding mobile, flexible, and real-time access to critical data. But, you're bound to encounter a few potholes along the road to anytime-anywhere computing. Vieraitis, Bob Nov 1, 2003 3278
A different take on Wi-Fi security: instead of just focusing on securing the connection, make smart choices about what parts of your network you make available wirelessly. Barken, Lee Nov 1, 2003 3104
The security-privacy paradox. Brief Article Nov 1, 2003 169
Computer security. Nelms, Clinton F. Nov 1, 2003 1131
SSL or IPSec? Or both? encryption and authentication technologies are effective as part of overall security architecture. May, Susan Oct 1, 2003 1068
Computer disposal raises legal issues. Oct 1, 2003 455
Strategies for sharing and protecting sensitive information: the emergence of secure-collaboration technology carries the promise that organizations can share sensitive information without worrying about theft and misuse. Price, Elaine Oct 1, 2003 1551
Are corporate information assets, in the midst of dynamic technological and infrastructural advances, best secured by legal or self-help remedies? Schwartz, Randall W. Sep 22, 2003 13368
Security Industry Offers US Congress Virus Advice. Sep 11, 2003 713
Plug & pray? A layered security system can help keep your wireless system safe. Gaby, Bob Sep 1, 2003 1405
Are you ready for the next cyber attack? Swartz, Nikki Sep 1, 2003 357
DHS Calls for Culture of Security. Aug 1, 2003 371
Privacy Programming Language Planned by IBM. Brief Article Jul 9, 2003 292
LANDesk Expands into Vulnerability and Patch Management. Brief Article Jul 7, 2003 225
Protect your computer before it's too late. (A Tech Perspective). Jun 23, 2003 693
How secure is your computer? (Around the Fleet). Comerford, Tim Jun 1, 2003 447
Digital architecture as crime control. . Katyal, Neal Kumar Jun 1, 2003 15505
Market Dynamics: enterprise security market hot spots. Industry Overview May 28, 2003 6292
Secure the network the same as a home: basic rules apply to keeping unwanted visitors out of prized possessions at home and at work. (Wireless). Dowd, Tom Industry Overview Apr 1, 2003 694
Terrorism sting busts immigrants. Kaneya, Rui Mar 1, 2003 2572
'7 steps' for network security: being prepared and knowledgeable is the best defense against hackers and data thieves. (Local Area Networks). Ellis, Chris Feb 1, 2003 1067
Centrally managed network security: hope or reality? Don't wait for the standards to evolve. (Software Intelligence). Thomsen, Dan Feb 1, 2003 1055
Detect rogue access points: unsecured wireless access points negate any effort you've made to protect your network--even implementing firewalls. Here's how to detect them. Eder, John Feb 1, 2003 1677
The instant message menace. (Tech Talk). Piazza, Peter Jan 1, 2003 612
How to secure switches and routers: security-in-depth philosophy marries traditional network security technologies with implementations. (Special Focus: local area networks). Hayes, Jeff Jan 1, 2003 1353
10 tips for mobile security: as the number of mobile workers increases, security challenges become more important. (Wireless). Clarkin, Michael Jan 1, 2003 843
Wake up call to company directors over IT security. (Security). Brief Article Jan 1, 2003 118
Backup plans: a step-by-step guide to protect your data. Scicluna, Tony Nov 1, 2002 1058
Kaspersky Lab issues advice on preventing Opasoft infection. Brief Article Oct 4, 2002 139
The future of data protection: looking to the future. (Storage Networking). VanArsdale, Lynne Sep 1, 2002 1419
Making wireless networks secure. (Security). Levington, Michelle Sep 1, 2002 1536
Intrusion detection is failing: enter intrusion management. (Security). Blackman, David Sep 1, 2002 1209
Chalk another one up to the hackers. Aug 19, 2002 296
E- business data exchange-security essentials. (Security). Aug 1, 2002 1013
Cryptography. (Technote). Aug 1, 2002 1013
PDA survey says private & corporate secrets unprotected. (Security News). Aug 1, 2002 574
Total cost of survival: the new metric for business continuity. Moore, Fred Aug 1, 2002 1089
Securing network infrastructures: meshed topographies simultaneously preserve security and accessibility. (Storage Networking). Ross, Cecilia Aug 1, 2002 2944
Dominate your data. (Special Focus on Risk Management). Gibbs, David J. Jun 1, 2002 2179
Legal binds. May 10, 2002 1422
Risk and reward? May 10, 2002 1483
Windows of opportunity. May 10, 2002 1355
Wide open wireless? May 10, 2002 1416
Still a 'head in the sand' approach to IT security among UK businesses, says survey. Brief Article May 10, 2002 221
Protecting your identity; private information theft has become a plague on modern society, but you can protect your business and yourself with the right technology and processes. Groves, Shanna Statistical Data Included May 1, 2002 2401
Privacy: what every manager should know: companies can't afford to ignore the fact that consumers are increasingly concerned about how businesses use their personal information. Haller, Susan C. May 1, 2002 3673
The ethics of database marketing: personalization and database marketing--if done correctly--can serve both the organization and the customer. (Business Matters). Cannon, Debbie A. Statistical Data Included May 1, 2002 1370
Privacy vs. cybersecurity: the advantages of doing business over the Internet are tremendous--but only if enterprises can ensure exchanging information in cyberspace is secure. (Tech Trends). Phillips, John T. May 1, 2002 2277
SNMP's real vulnerability: in-band network management, by its very nature, poses business continuity issues that need to be addressed. (The Bottom Line). Liebmann, Lenny Column Apr 1, 2002 686
Server consolidation: cost saving but what about security? (Security). Henry, Katherine Apr 1, 2002 995
Partners in protection: By combining IT and physical security, this company saved money and improved response time to incidents. (Management). Morris, James R. Feb 1, 2002 2822
Internet security guide released in Hong Kong. Brief Article Jan 15, 2002 81
New-age arms race: Cyber attackers pose constant computer threat. Marks, Susan J. Jan 1, 2002 1238
Protecting Information on Laptops, PDAs, and Cell Phones. Frank, Kimberly E.; Charron, David Jan 1, 2002 3003
Security standards improve: improved encryption standards offer better wireless safeguards. (Wireless). Savarese, Joe Jan 1, 2002 723
Sounding the alarm on campus computer security. (technology today). Roach, Ronald Brief Article Dec 24, 2001 568
One and done: the use of biometrics and authentication technologies can help healthcare organizations reduce workflow costs while safeguarding access to patient data. (Biometrics/Authentication). Kuperstein, Michael Dec 1, 2001 1313
Three crucial elements for maximum security: optimize network security architectures with integrated VPN/firewalls. (Network management: security). Dec 1, 2001 743
Security Breach: Wireless Networks Less Than Secure. (Tech Talk). Platis, Athena Nov 1, 2001 1817
From Risk to Reward: E-business is transforming risk. Insurer AIG is transforming the way organizations manage that risk. (CaseStudy). Schoeniger, Eric Brief Article Nov 1, 2001 910
Inside AICPA. Oct 1, 2001 377
Data protection report. Oct 1, 2001 363
Tech fixes cannot maintain information security. (VIRUS NOTES). Oct 1, 2001 337
Guarding Your Gateway. MCCLURE, DAVE Aug 1, 2001 3252
CSEAT With a View. PIAZZA, PETER Brief Article Aug 1, 2001 289
A Honey Pot Improves Security. Hill, Wick Aug 1, 2001 1048

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters