Printer Friendly

Browse Data security topic

Evaluation subtopic



1-79 out of 79 article(s)
Title Author Type Date Words
Is your company managing BYOD? Mobile devices have improved productivity, but they have created new security challenges. Howard, Tim Sep 2, 2016 806
Secure connectivity in the age of the teleworker: working from home requires a different set of guidelines and requirements than working from an office. Walsh, Steve Aug 5, 2016 928
The next frontier: what do management accountants need to know about measuring and managing sustainability performance? Rogers, Jean Jun 1, 2016 3895
ITGC and the management accountant: a strong leader in management accounting monitors data-as well as system implementations, upgrades, and improvements-through IT General Controls. Murphy, Glenn Jun 1, 2016 1177
The department of defense and the power of cloud computing: weighing acceptable cost versus acceptable risk. Dudash, Steven C. Report Apr 1, 2016 11300
Telling the public pension story with hard data. Kellar, Elizabeth K.; Snowden, Amber Feb 1, 2016 1046
Cybersecurity: watch out for data leaks! Nathan, Barry; Smith, Pem Jan 1, 2016 1111
Half of U.S. firms lack formal BYOD policy. Brief article Jan 1, 2016 294
SEC warns CCOs about cybersecurity lapses. Jan 1, 2016 544
Cyber scares. Gray, Annie Nov 1, 2015 338
Some insightful numbers. Brief article Nov 1, 2015 207
Comsats holds joint workshop on cyber security. Brief article Oct 4, 2015 179
Consumers are loyal where data is safe. Statistical table Oct 1, 2015 114
Performance evaluation of AODV routing protocol under black hole attack. Selvakumar, K.; Malarvizhi, N.; Murugan, V. Senthil Report Jun 1, 2015 2555
Frost & Sullivan: need for cybersecurity lies in every sector. Brief article May 1, 2015 190
System security: Supply chainmail; digital connections are spreading throughout the industry, enabling mobile, automated and real-time processes. But when opportunity overshadows security risks, new technologies can increase your exposure. Bond, Josh Statistical data May 1, 2015 2189
Shifting the paradigm - bringing to justice those who commit human rights atrocities. Ellis, Mark S. Mar 22, 2015 9165
Technology trends to prepare for in 2015: 2015 is expected to be an exciting year for technology, including cybersecurity, wearable technology, social media, 3D printing, cloud computing, and predictive analysis. Roque, Rob Feb 1, 2015 2240
What's your fraud IQ? Capers, Zach; McNeal, Andi Feb 1, 2015 2532
Your business is multifaceted. So is Finley. Jan 1, 2015 381
Policy for US cybersecurity. Roesener, August G.; Bottolfson, Carl; Fernandez, Gerry Nov 1, 2014 5231
Welcome to the metropticon: protecting privacy in a hyperconnected town. Finch, Kelsey; Tene, Omer Oct 1, 2014 13841
Iowa's Hyperstream immerses kids in programming. Brief article Oct 1, 2014 143
Managing data protection in higher education. Coffman, Deena Sep 1, 2014 1987
Wired Magazine: Study finds widespread vulnerabilities in hospital equipment, medical devices, and electronic health records. McAdara-Berkowitz, Jeanne Brief article Jun 22, 2014 177
Security analysis and evaluation of random linear network coding under wiretapping attack. Xiaoxing, L.V.; Baihai, Zhang Report Dec 1, 2013 3319
Privacy versus security. Bambauer, Derek E. Jun 22, 2013 7559
Measuring security of web services in requirement engineering phase. Mougouei, Davoud; Rahman, Wan Nurhayati Wan Ab.; Almasi, Mohammad Moein Report Apr 1, 2012 5611
CPAs discuss advantages, challenges. Drew, Jeff Mar 1, 2012 2163
Best practices for leak-free communication: highly publicized leaks of sensitive documents have brought attention to the importance of an issue that can lead to business and reputational loss as well as government penalties. Protecting sensitive organizational data--whether internal or shared--is a serious concern. But there are solution. Rafalin, Moti Sep 1, 2011 1600
Cloud computing: is it safe and secure? Wessels, Tim Jul 29, 2011 618
Has anyone seen my keys? MacLeod, Calum Column Mar 1, 2011 1065
New DLP appliances from Blue Coat ease deployment issues. Brief article Jun 21, 2010 209
The path of least resistance: in this article Cyber-Ark sympathises with workers and encourages organisations to help them get on and do their jobs mark fullbrook, UK & Ireland director, Cyber-Ark. Jan 1, 2010 1020
The state of data security, 2009: budget pressures lead to increased risks. McKendrick, Joe Dec 1, 2009 872
Achieving PCI compliance for legacy host access. Morris, Sam Dec 1, 2009 1922
Changing times, changing data management. Read, Brendan Nov 1, 2009 2150
The hidden costs of neglecting IT maintenance. Aronson, Mark L. Mar 27, 2009 587
Cloud-based security services: will 2009 be the year this much hyped sector come of age: Pravin Mirchandani, CEO of network security specialists Syphan Technologies, argues that the emergence of new high-speed security technologies as we head into a recession is likely to be the catalyst for more widely available cloud-based security services. Mar 1, 2009 1475
Is the Internet broken? Anderberg, Ken Mar 1, 2009 1229
Security-aware optimized link routing protocol for mobile ad-hoc networks. Dhir, Amandeep; Sengupta, Jyotsna Technical report Feb 1, 2009 12700
I.T.'s dirty little secret--privileged passwords. Fullbrook, Mark Feb 1, 2009 990
How to avoid becoming the next data loss headline. Midgley, Stephen Feb 1, 2009 756
Most data breaches involve paper. Jan 1, 2009 574
Insuring and securing your data. Gold, Joshua Nov 1, 2008 626
Intertec Systems offers training programme on Information Security for IT managers. Jun 8, 2008 373
Antek HealthWare's evolving software solutions. Dixon, Gary Editorial Apr 1, 2008 702
Security still not a priority. Brief article Mar 1, 2008 282
A multi layered approach to prevent data leakage. Mattsson, Ulf Feb 1, 2008 4946
Corporate wireless networks are not secure, warns NTA Monitor. Brief article May 2, 2007 281
The truth is in there: sleuthing for data with digital forensics. Miller, Ron Mar 1, 2007 2701
Data security to heat up at federal, state levels in 2007. Conference news Jan 1, 2007 522
Fat or thin? Anderberg, Ken Viewpoint essay Dec 1, 2006 468
Manage e-mail archive risk. Chen, Paul Dec 1, 2006 570
The key to secure remote computing: ultra-portable technology allows users to access their enterprise applications. White, Andrew Dec 1, 2006 1088
The web vs. the real world: who do you trust? Trembly, Ara C. Column Sep 18, 2006 858
Data storage and disaster recovery: be prepared. And be prepared now. Colby, Kent L. Aug 1, 2006 1693
Security paranoia. Anderberg, Ken Viewpoint essay Aug 1, 2006 477
Information security's biggest enemy. Wagner, Cynthia G. Brief article Jul 1, 2006 185
Companies still risk information theft. Green, Meg Brief article Apr 1, 2006 263
Regain visibility and control: managed services can help with application optimization and acceleration. Grinder, Stephen Mar 1, 2006 1091
Better safe than sorry: backing up data today helps ensure recovery tomorrow. Beasty, Colin Mar 1, 2006 464
Arming the road warrior. Piazza, Peter Jan 1, 2006 4288
Computer security: networks face new email-related threats. Heffes, Ellen M. Jun 1, 2005 321
Secure I.T.: everyone is responsible for security, and a few simple measures can make all the difference. A report from QinetiQ explains. Nov 1, 2004 1542
The five pillars of information security. Ameri, Amir Jul 1, 2004 712
Assessing your storage and backup for regulatory compliance. Barth, Ken May 1, 2004 1762
NSF scores well on security. Mar 1, 2004 569
Infinite patience. Castelluccio, Michael Sep 1, 2003 884
Cyber security: key to homeland security. (Up front: news, trends & analysis). Brief Article Jul 1, 2002 370
Scenario 2a: a woman contacts her therapist about a friend of her son's "martyrdom mission.". Feb 28, 2002 1257
Security Heads AICPA's Top 10 Technologies. Brief Article May 1, 2001 115
There is a Lack of Privacy on the Web. Lederer, Naomi Sep 22, 2000 1041
Who's Watching? Castelluccio, Michael Jul 1, 2000 1030
E-mail Content Poses Serious Risks. Brief Article Feb 1, 2000 316
Why you need database protection. Studt, Tim Sep 1, 1997 539
LAN and E-mail exposure: the bottom line. Arbetter, Lisa Mar 1, 1994 355
Notebook security in a Nutshell. Patterson, Tom Sep 1, 1993 1583

Terms of use | Copyright © 2017 Farlex, Inc. | Feedback | For webmasters