Printer Friendly

Browse Data security topic

Management subtopic



1-300 out of 591 article(s) nextnext page
Title Author Type Date Words
Cyber and the C-suite: new cyberrisk responsibilities for chief risk officers. Doherty, John; Watson, Mark Jun 1, 2017 1440
Securing remote access at Genesis Health System. Miri, Aaron Report Jun 1, 2017 562
Keeping client information safe in an age of scams and security threats: a look at the dirty dozen tax scams and ways to protect taxpayer information. May 1, 2017 2494
Cyber concerns: insurance professionals speak with [A.M.]BestTV about cyberrisk and the rapid growth in coverage. Mar 1, 2017 445
The armor of awareness. Ference, Sarah Beckett Mar 1, 2017 1432
10 cybersecurity trends to watch in 2017: Will the hard-learned lessons of 2016 lay the foundation for healthcare security success in the future? McMillan, Mac Feb 1, 2017 914
You've been breached! Now what? Arvin, Marti Report Nov 1, 2016 926
Keeping clients' tax data secure. Roane, Dayna E. Oct 1, 2016 1082
Newsletters made easy: The Washington Post has developed its own newsletter delivery platform. Stroh, Sean Oct 1, 2016 436
What we talk about when we talk about "reasonable cybersecurity": a proactive and adaptive approach. Miller, Kevin L. Sep 1, 2016 5575
Troubleshooting tips. Brown, Steve Jul 1, 2016 463
Acceptance growing, security lagging. Jul 1, 2016 298
What to know before you commit to the cloud: this report answers common questions CPAs may have as they consider making the transition. Hart, Lea Jul 1, 2016 2025
The evolution of cybercrime: Why aren't we evolving with it? Why aren't we evolving with it? Michael Van Alstin, Chad Editorial Jun 1, 2016 674
Holdup at Checkout. Karolefski, John Jun 1, 2016 1426
"How do I protect my store?". Brief article Feb 1, 2016 221
Cybersecurity: getting proactive about data vulnerability. Thompson, Renee E. Jan 1, 2016 821
Data protection for the HR department. Arden, Ron Nov 1, 2015 687
The issue of cyber risk disclosures. Afterman, Allan B. Nov 1, 2015 1497
Developing a cyberbreach strategy. Tuttle, Hilary Oct 1, 2015 3049
Helping the C-suite assess cyberrisk. Dennis, Patrick Oct 1, 2015 940
Forming a culture of security: if the bad guys' can hack into the federal government, Home Depot and Target, what hope do small businesses have? Victor, Adam Sep 4, 2015 590
No one is safe. Berman, Alan Sep 1, 2015 1848
The cure to improve and protect health care records. Bagwell, Scott Sep 1, 2015 1440
Tax technology: forging forward - but how fast and in which direction? Data rules the tax technology roost, elevating professionals who embrace its potential, but the "new normal" is not without its pitfalls. Levin-Epstein, Michael Cover story Sep 1, 2015 6232
Are you sitting on a cyber security bombshell? Dobrian, Joseph Sep 1, 2015 1688
The challenges of cross-border discovery. Report Jul 1, 2015 388
Personal precautions. Lesonsky, Rieva Column Jul 1, 2015 1770
A survey on trust management in cloud computing. Judgi, T.; Varalakshmi, P. Report Jun 1, 2015 3453
Review of security threats and its countermeasures in Mobile Adhoc Networks. Geetha, A.; Sreenath, N. Report Jun 1, 2015 2982
A strategic analysis of information sharing among cyber hackers. Hausken, Kjell Report May 1, 2015 11455
Patterson Dental introduces AutoSDS[SM] to help dental practices manage safety data, as required by the Occupational Safety and Health Administration (OSHA). Brief article May 1, 2015 169
A primer on data security: how CPAs can help. Brown, Ted May 1, 2015 3484
Protecting organizations--and culture--through digital preservation. Wiler, Vicki May 1, 2015 520
New Russian data residency law has far-reaching effects. Brief article May 1, 2015 290
Study says: Europeans fear their data isn't safe. May 1, 2015 367
Legal departments are prime targets for hackers. Brief article May 1, 2015 255
Cyberattacks threaten critical infrastructure. Locaria, Dismas; Wool, Jason R. May 1, 2015 1069
Secure connectivity in the age of the teleworker. Walsh, Steve Apr 17, 2015 750
Defending the corporate network from cybercrime. Sax, Douglas Apr 17, 2015 573
Security study: ditch the username and password. Apr 17, 2015 592
Cybersecurity: recognizing the risk and protecting against attacks. Shields, Kristin Mar 1, 2015 10122
The new normal. Barry, Joanne S. Mar 1, 2015 392
Establishing and monitoring the right metrics for RIM program success. Wiler, Vicki Editorial Mar 1, 2015 510
CIGO may be next step in information governance. Brief article Mar 1, 2015 329
Assess to be 'the best' in 2015. Wiler, Vicki Editorial Jan 1, 2015 559
Executives say--but don't act like--data security is vital. Jan 1, 2015 328
Europe's biggest cybersecurity threat isn't hackers. Brief article Jan 1, 2015 189
Social media makes e-discovery a headache. Brief article Jan 1, 2015 296
Guidelines on data breach insurance released. Brief article Jan 1, 2015 165
Count the cost: quantifying your vital records' risks: quantitative risks assessment, which uses numeric calculations to measure the likelihood and impact of the loss of specific vital records, provides a solid basis for planning how to protect them. Saffady, William Jan 1, 2015 2626
Mobile under control: software allows districts to manage and secure a wide range of tablets and other devices. Remis, Katie Kilfoyle Dec 1, 2014 1827
Identity hack! Is your company next? Mulig, Elizabeth; Smith, L. Murphy; Stambaugh, Clyde T. Dec 1, 2014 3457
Historic Florida School expands security capabilities with new technology: mobile duress system from Inovonics part of diverse security strategy at the Cushman School. Nov 1, 2014 585
Maintaining safety and privacy in a digital world: the rapidly-expanding world of digital media poses many challenges for nurses in their daily practice. O'Connor, Teresa Nov 1, 2014 962
Shattering stereotypes with IG skills. Wiler, Vicki Editorial Nov 1, 2014 538
Healthcare industry battles breaches. Nov 1, 2014 334
Get ready for wearable technology in the office. Nov 1, 2014 587
Notable trends in e-discovery. Nov 1, 2014 397
Cloud control: managing the risks of engaging and terminating cloud services. Boyd, Brian Y. Nov 1, 2014 2875
Research says: focus on business technology agenda to ensure IG success. McKinnon, Cheryl Nov 1, 2014 2626
Divisive security. Collins, J. Carlton Oct 1, 2014 692
Investing in privacy and your career--by design. Wiler, Vicki Sep 1, 2014 518
Congress asked to help protect consumers' data. Brief article Sep 1, 2014 245
Cyber crime costs more than $400b annually. Sep 1, 2014 316
Data privacy becomes an HR issue. Brief article Sep 1, 2014 211
New risk maturity index emerges from study. Sep 1, 2014 513
Needed: cybersecurity professionals. Sep 1, 2014 538
Principles for protecting information privacy. Gable, Julie Sep 1, 2014 2477
China halts cybersecurity cooperation. Brief article Jul 1, 2014 147
Survey: information governance not being embraced. Jul 1, 2014 514
Cut costs, risks with proactive litigation plan. Wylie, Michael C.; Layton, Kelli A. Jul 1, 2014 2466
How to develop and implement an effective RIM policy. Richardson, Blake E. Jul 1, 2014 1901
The importance of data integrity: told as a hypothetical fable. McKee, Thomas E. Jul 1, 2014 1237
Issues of privacy and surveillance in information age: in the web 2.0 environment and organizational setting. Ju, Ran Report Jul 1, 2014 5320
The password is always "swordfish". Phillips, C. Douglas Jul 1, 2014 427
Are your secrets safe? Murata, Jason; Tanski, John; Oppenheimer, Brooke Jun 1, 2014 931
Digital health services face security issues. Bruemmer, Michael Jun 1, 2014 509
The U.S. Senate has cast a vote in favor of enhanced government data transparency in passing the Digital Accountability and Transparency Act. Melancon, Barry C. Brief article May 1, 2014 111
Japan holds cybersecurity drill. Brief article May 1, 2014 236
The role of human factors in information system security. safari, Leila; Rahmati, Azizallah Report May 1, 2014 3206
Data security risk: you can take it anywhere. Sheinis, Richard; Ference, Sarah Beckett Apr 1, 2014 1140
Better put on your running shoes: mitigate the risks of cyber attacks. Free, Jason Apr 1, 2014 2002
Users are cybersecurity's Achilles heel. Jan 1, 2014 328
Core questions for cyber attack guidance. Rice, Jonathan C. Essay Oct 1, 2013 6644
Mobile information security concerns. Holub, Steven F.; Parker, Kenneth M. Sep 1, 2013 2510
How To Keep The NSA Out Of Your Computer. Thompson, Clive Brief article Aug 21, 2013 229
Unpacking cyberwar: the sufficiency of the law of armed conflict in the cyber domain. Phillips, Kyle Genaro Report Jul 1, 2013 3591
Awaiting cyber 9/11. Magee, Clifford S. Report Jul 1, 2013 4654
Running a war by computer: cyber warfare and its dilemmas: Stuart McMillan discusses a growing international security problem. McMillan, Stuart Essay May 1, 2013 2474
Cyber security: the strategic challenge and New Zealand's response: Joe Burton discusses an emerging problem with major implications. Burton, Joe Essay May 1, 2013 3021
Phone data dial in crime network: program mines mobile calls for incriminating patterns. Ehrenberg, Rachel Apr 20, 2013 361
Use of ontologies in mapping of information security requirements/Ontologijos naudojimas informacijos saugumo reikalavimams susieti. Ramanauskaite, Simona; Radvile, Egle; Olifer, Dmitrij Report Apr 1, 2013 1496
Hackers, spies, and stolen secrets: protecting law firms from data theft. Ezekiel, Alan W. Mar 22, 2013 9011
Incorporating global information security and assurance in I.S. education. White, Garry L.; Hewitt, Barbara; Kruck, S.E. Report Mar 22, 2013 3763
Information security assessment of SMEs as coursework--learning information security management by doing. Ilvonen, Ilona Report Mar 22, 2013 6390
Preparing information systems (IS) graduates to meet the challenges of global IT security: some suggestions. Sauls, Jeff; Gudigantala, Naveen Report Mar 22, 2013 1913
The drama continues ... on several fronts. Editorial Mar 1, 2013 528
Performance evaluation of PIM-DM multicasting network over ICMP ping flood for DDoS. Kumar, Ashish; Sharma, Ajay K.; Singh, Arun; Ambedkar, B.R. Report Dec 1, 2012 3110
Getting off the data storage treadmill. Wessels, Tim Nov 30, 2012 527
The first steps to managing cyber-risk. Dunbar, Thomas Oct 1, 2012 2339
Data security 101: avoiding the list: healthcare data may be ripe for the picking, and that's causing sleepless nights for many CIOs. Perna, Gabriel Oct 1, 2012 1670
A question of security: unauthorised access to secure data through electromagnetic leakage used to be a concern only for the military and governments. Now it bothers others. Pullin, John Oct 1, 2012 1896
MODELING AUTHENTICATION AND AUTHORIZATION SECURITY SERVICE FOR WS-SECURITY ARCHITECTURE. Memon, Mukhtiar; Menghwar, Gordhan D.; Jalbani, Akhtar A.; Depar, Mansoor H.; Rahu, Ghulam Ali Report Sep 30, 2012 2434
The international governance framework for cybersecurity. Rosenzweig, Paul Sep 22, 2012 11630
Managing cybersecurity risks: mobile and cloud open doors to opportunities and threats. Drew, Jeff Aug 1, 2012 2838
A novel adaptive distance protection scheme based on variable data window/ Nauja adaptyvi nuotolines apsaugos schema pagrista kintamu duomenu langu. Deng, Xing; Yin, Xianggen; Zhang, Zhe; Wu, Dali Report Jul 1, 2012 4258
Transnational crimes and information technologies. Ekmekcioglu, Ercan Report Jun 1, 2012 2182
Company's information and telecommunication networks security risk assesment algorithm/Imoniu informaciniu ir telekomunikaciniu tinklu saugos rizikos ivertinimo algoritmas. Japertas, S.; Cincikas, G.; Sestaviskas, R. Report May 1, 2012 2787
CPAS prioritize tech security: many unsure how to best leverage emerging trends. Drew, Jeff May 1, 2012 889
Sailing the Cyber Sea. Stavridis, James G.; Parker, Elton C., III Apr 1, 2012 5201
Mitigative counterstriking: self-defense and deterrence in cyberspace. Kesan, Jay P.; Hayes, Carol M. Mar 22, 2012 10957
Mitigative counterstriking: self-defense and deterrence in cyberspace. Kesan, Jay P.; Hayes, Carol M. Mar 22, 2012 13135
Mitigative counterstriking: self-defense and deterrence in cyberspace. Kesan, Jay P.; Hayes, Carol M. Mar 22, 2012 32505
No backup. Robinson, Arthur B. Mar 22, 2012 1164
A sustainable information security framework for e-Government--case of Tanzania. Wangwe, Carina Kabajunga; Eloff, Maria Margaretha; Venter, Lucas Case study Mar 1, 2012 6134
Privacy aware recommender service using multi-agent middleware --an IPTV network scenario. Elmisery, Ahmed M.; Botvich, Dmitri Report Mar 1, 2012 12367
Secure key exchange scheme for IPTV broadcasting. Pippal, Ravi Singh; Tapaswi, Shashikala; Jaidhar, C.D. Report Mar 1, 2012 3941
Times limited accountable anonymous online submission control system from single-verifier k-times group signature. Zhao, Xingwen; Zhang, Fangguo Report Mar 1, 2012 6379
Shredded documents brought back to life. Beidel, Eric Brief article Mar 1, 2012 279
Computer network security--evolving risks. Schirick, Edward A. Mar 1, 2012 1646
The impact of mobility patterns on MANET vulnerability to DDoS attacks/Mobilumo modelio poveikis MANET tinklu jautrumui DDoS atakoms. Stojanovic, M.; Acimovic-Raspopovic, V.; Timcenko, V. Report Mar 1, 2012 4050
Cyber security review: as threats proliferate, here are five areas where companies need to strengthen and update their policies and practices. Korolov, Maria Feb 1, 2012 1081
Unsecured mobile devices: the weak link: data breaches are becoming more common and more expensive, according to a recent study. Raths, David Feb 1, 2012 531
Malicious botnet survivability mechanism evolution forecasting by means of a genetic algorithm/Kenkejisku botnet tinklu isgyvenamumo mechanizmu evoliucijos prognozavimas genetinio algoritmo priemonemis. Goranin, Nikolaj; Cenys, Antanas; Juknius, Jonas Report Feb 1, 2012 5009
Composite DoS attack model/Jungtinis DoS ataku modelis. Ramanauskaite, Simona; Cenys, Antanas Report Feb 1, 2012 3876
Techniques for modelling network security/Kompiuteriu sistemu saugumo modeliavimas. Gulbinovic, Lech Report Feb 1, 2012 1752
SSN reduction plan Phase 1 and 2 results. Muck, Steve Jan 1, 2012 516
CyberPatriot: exploring university-high school partnerships. Manson, Daniel; Curl, Steven; Carlin, Anna Report Jan 1, 2012 4534
Continuous monitoring: protecting the enterprise and executive suite. Taylor, Patrick Jan 1, 2012 1545
Life in the cloud: what exactly is cloud computing? And is it a safe way to store my files? Bertolucci, Jeff Jan 1, 2012 637
Novel information leakage threat for input operations on touch screen monitors caused by electromagnetic noise and its countermeasure method. Sekiguchi, H. Report Jan 1, 2012 6656
Distributed denial of service attack principles and defense mechanisms. Zheng, Ying Report Dec 31, 2011 1663
Security check: new technologies are helping to lock down business premises, stock and assets. Steve Hart looks at some of the latest trends in business security and surveillance. Hart, Steve Dec 1, 2011 1956
Password apathy. O'Rourke, Morgan Brief article Dec 1, 2011 202
Message-optimal algorithm for detection and resolution of generalized deadlocks in distributed systems. Srinivasan, Selvaraj; Rajaram, R. Report Dec 1, 2011 7973
Bradford Networks unveils Network Access Control Security-as-a-Service offering. Brief article Nov 2, 2011 178
PDMMS: a new tool for managing Personal Dust Monitor data. Petrice, Ty; Jackson, Tracina; Volkwein, Jon Oct 1, 2011 1849
High tech, high risk: the evolution and impact of cybercrime. Brief article Oct 1, 2011 237
The digital threat: cyberattacks put critical infrastructure under fire. George, Torsten Oct 1, 2011 1279
The cost of compliance: protection from cyberattacks does not come cheap. Schou, Eric Oct 1, 2011 506
The coverage question: your guide to selecting cyber-insurance. Rapoport, Gregg A.; Lam, David Oct 1, 2011 1107
Cybersecurity in the private sector: the nations businesses manage a significant share of online activity related to national security and must play a larger role in ensuring the overall integrity of the system. Etzioni, Amitai Sep 22, 2011 3234
Penetration testing: hacking made ethical to test system security. Boteanu, Daniel Sep 22, 2011 1324
Tech data, please; tech data rights, competition, and affordable sustainment. Gallop, David L. Sep 1, 2011 1617
Smart grid information security (IS) functional requirement. Ling, Amy Poh Ai; Masao, Mukaidono Report Sep 1, 2011 4913
Beyond awareness: using business intelligence to create a culture of information security. Paulsen, Celia; Coulson, Tony Report Aug 1, 2011 7225
Developing a metrics framework for the federal government in computer security incident response. Sritapan, Vincent; Stewart, Walter; Zhu, Jake; Rohm, C. E. Tapie, Jr. Report Aug 1, 2011 5687
Resist the temptations of the cloud! Jul 21, 2011 1121
Assessment of cyber attacks influence over internet network/Kibernetiniu ataku itakos interneto tinklui tyrimas. Kajackas, A.; Rainys, R.; Aputis, A. Report Jul 1, 2011 2146
Total privacy and absolute disclosure in the blogosphere: how anonymous courtesan blogs reveal all and why. Kozhan, Marian Report Jul 1, 2011 1353
Location privacy: who protects? Cottrill, Caitlin D. Report Jul 1, 2011 8078
Supporting Data Use While Protecting the Privacy, Security and Confidentiality of Student Information: A Primer for State Policymakers. Report Jul 1, 2011 344
China's cyberassault on America. Jun 15, 2011 1152
An empirical study of factors affecting electronic commerce adoption among SMEs in Malaysia/Veiksniu, turinciu itakos elektorinei prekybai, studija: Malaizijos pavyzdys. Alam, Syed Shah; Ali, Md. Yunus; Jani, Mohd. Fauzi Mohd. Report Jun 1, 2011 11018
Wireless networks interference and security protection by means of vegetation barriers. Acuna, J.; Cuinas, I.; Gomez, P. Report Jun 1, 2011 4366
Information security activities of college students: an exploratory study. Mensch, Scott; Wilkie, LeAnn May 19, 2011 10622
Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies. Prestigiacomo, Jennifer May 1, 2011 1930
The power of aggressive analytics: if your bank aspires to be more customer-centric, you need to bulk up to a more muscular analytics approach. That means bolstering your method for securing and integrating data; upgrading your analytics capabilities; and applying more effective measurements to your marketing mix. Castro, Carlos May 1, 2011 2150
Unified modeling language based analysis of security attacks in Wireless Sensor Networks: a survey. Hong, Sunghyuck; Lim, Sunho; Song, Jaeki Apr 1, 2011 5344
Local linear transform and new features of histogram characteristic functions for steganalysis of least significant bit matching steganography. Zheng, Ergong; Ping, Xijian; Zhang, Tao Apr 1, 2011 7038
Report examines potential risks of privacy and security breaches of personal health data. Apr 1, 2011 395
Editors' introduction to the special issue on autonomic and self-adaptive systems. Camara, Javier; Cuesta, Carlos; Perez-Toledano, Miguel Angel Editorial Mar 1, 2011 957
An aspect-oriented approach for supporting autonomic reconfiguration of software architectures. Costa-Soria, Cristobal; Perez, Jennifer; Carsi, Jose Angel Report Mar 1, 2011 9808
An identity-based mediated signature scheme without trusted PKG. Wang, Xiaofeng; Wang, Shangping Report Mar 1, 2011 7094
Resource control and estimation based fair allocation (EBFA) in heterogeneous active networks. Devi, K. Vimala; Thangaraj, C.; Mehata, K.M. Report Mar 1, 2011 7750
Leveraging EAD for low-cost access to digitized content at the University of Alabama Libraries. DeRidder, Jody L. Report Mar 1, 2011 3030
Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices/Mobiliuju irenginiu AES ir Rijndael kriptoalgoritmu energijos sanaudu ir saugumo polyginimas. Toldinas, J.; Stuikys, V.; Damasevicius, R.; Ziberkas, G.; Banionis, M. Report Feb 1, 2011 2124
Afghan Mission Network. Heininger, Claire Jan 1, 2011 403
Personal and regulatory data protection in Ukraine. Report Jan 1, 2011 1821
The worst or average availability: option for the SLA contract/Blogiausios rysio uzmezgimo galimybes paieska taikant SLA tipo sutartis. Rados, I. Report Jan 1, 2011 3691
Mastering the art of Wiki: understanding social networking and national security. Carafano, James Jay Jan 1, 2011 5036
Cyberbullying, the First Amendment and the legal challenge of advancing technology. McManimon, Susan Report Jan 1, 2011 2306
Risks of advanced persistent threats and defense against them. Smiraus, Michal; Jasek, Roman Report Jan 1, 2011 1617
Stolen data and fraud: the Hannaford Brothers data breach.(Instructor's Note) Clapper, Danial L. Case study Dec 15, 2010 6023
Stolen data and fraud: the Hannaford Brothers data breach. Clapper, Danial L. Case study Dec 1, 2010 4035
A cross-layer approach for mitigating denial of service attacks: device-driver packet filter and remote firewalling. Wade, Joshua B.; Fujinoki, Hiroshi; Coffman, Adam; Feerer, Delia M.; Hauck, Andrew G. Dec 1, 2010 5434
Enhancing DDoS flood attack detection via intelligent fuzzy logic. Xia, Zhengmin; Lu, Songnian; Li, Jianhua; Tang, Junhua Report Dec 1, 2010 6741
Multisignature scheme based on discrete logarithms in the plain public key model. Shao, Zuhua Report Dec 1, 2010 6115
An investigation and extension of a hyper-heuristic framework. Rattadilok, Prapa Report Dec 1, 2010 8718
Two departments: one goal: network security is a duty of facilities departments, not only of IT departments. Wroblaski, Kylie Nov 1, 2010 731
Build and operate a trusted GIG. List Oct 1, 2010 1667
Rein in and rethink the use of recall rosters. Schmith, Michelle Case study Oct 1, 2010 584
Rootkit detection experiment within a virtual environment/Rootkit virusu aptikimo eksperimentas virtualioje aplinkoje. Toldinas, J.; Rudzika, D.; Stuikys, V.; Ziberkas, G. Report Oct 1, 2010 2723
R&M's Cabling Innovations Enhances Uptime and Security for the Middle East Finance Sector. Sep 5, 2010 603
Avoid being the next data-security-breach headline: while larger budgets provide healthcare managers with unique opportunities for technology advancements, few people are paying attention to their largest data security weakness--old IT. Kegley, Jim Sep 1, 2010 1276
Is your it security compromising your IP? There's no doubt that technology has transformed the way in which pharmaceutical companies do business. Rapid development in the digital sphere means that organizations can access expertise across the globe, share research and store data from multiple projects. Horton, Rob Sep 1, 2010 506
Keeping secrets: even in times of high employee turnover, proper care in the handling of confidential. information can reduce leaks to competitors. Staley, Daniel Aug 1, 2010 1846
Exploring the influence of national cultures on non-compliance behavior. Dols, Taco; Silvius, A.J. Gilbert Report Aug 1, 2010 7740
Modern quantum technologies of information security against cyber-terrorist attacks/Nformacijos sauguma uztikrinancios moderniosios kvantines technologijos, nukreiptos pries kompiuteriniu teroristu atakas. Korchenko, Oleksandr; Vasiliu, Yevhen; Gnatyuk, Sergiy Report Jun 1, 2010 8463
Matching recordings with needs. Read, Brendan May 1, 2010 2225
Resembling 'cartels,' Hackers become more industrialized. Mar 1, 2010 369
U.S.: EU Vote on Money Transfer Data 'Blow to Security'. Brief article Feb 20, 2010 89
Client portals: a secure alternative to e-mail: sending clients their tax returns via e-mail may soon no longer be an option. DeFelice, Alexandra Feb 1, 2010 1702
DS/IRM team wins information assurance award. Brief article Feb 1, 2010 236
Imperva reveals Top 10 weak password (list). Brief article Jan 22, 2010 139
Encryption strategies in databases. Boicea, Alexandru; Ghita, Vlad; Radulescu, Florin; Sarbu, Anca Daniela Report Jan 1, 2010 1281
Hidden information with infraredesign. Ziljak Vujic, Jana; Ziljak Stanimirovic, Ivana; Pogarcic, Ivan Report Jan 1, 2010 1647
Securing the client-server communication in WCF. Palka, Jan; Palka, Jiri; Motyl, Ivo Report Jan 1, 2010 1292
Security measures in virtual laboratory of microprocessor technology. Dulik, Tomas; Bliznak, Michal Report Jan 1, 2010 1420
Security analysis of UAV radio communication system/Bepilociu orlaiviu radijo rysio sistemos analize. Rudinskas, Darius; Goraj, Zdobyslaw; Stankunas, Jonas Report Dec 1, 2009 2671
Organized security: to address compliance and it security, Piedmont Healthcare chose to establish baseline metrics for it security risk. Cover story Dec 1, 2009 1543
Sophos introduces new data loss prevention technology. Brief article Oct 14, 2009 163
Cybersecurity: current legislation, executive branch initiatives, and options for congress. Theohary, Catherine A.; Rollins, John Report Sep 1, 2009 8877
Client data security for the tax practitioner. Black, Barton Sep 1, 2009 2136
Data lockdown? How institutions are answering the national call for better cybersecurity. McClure, Ann Cover story Sep 1, 2009 1871
HDMA: data sharing to hone supply chain. Brief article Aug 3, 2009 158
Simulation of a two-category secured access database. Shing, Marn-Ling; Shing, Chen-Chi; Chen, Kuo Lane; Lee, Huei Report Aug 1, 2009 3494
Informal justice and home affairs council : security: member states want "concrete projects. Jul 17, 2009 399
IT security is even more important in a recession. McLean, Michael R. Jul 3, 2009 408
LexisNexis responds to data breach. Brief article Jul 1, 2009 104
Data breaches, malware attacks on rise. Jul 1, 2009 438
FBI and US Marshals networks hit by virus. Brief article May 21, 2009 100
Data security, privacy, and identity theft: the economics behind the policy debates. Roberds, William; Schreft, Stacey L. Mar 22, 2009 6718
UPDATE: Congress drafting bill to protect users from targeted ads. Brief article Mar 13, 2009 183
Editorial: special issue on multimedia information system security. Lian, S.; Kanellopoulos, D.; Ruffo, G. Editorial Mar 1, 2009 1627
Recent advances in multimedia information system security. Lian, Shiguo; Kanellopoulos, Dimitris; Ruffo, Giancarlo Report Mar 1, 2009 16575
Detection of stego anomalies in images exploiting the content independent statistical footprints of the steganograms. Geetha, S.; Sindhu, Siva S. Sivatha; Kamaraj, N. Report Mar 1, 2009 10177
Visual security assessment for cipher-images based on neighborhood similarity. Yao, Ye; Xu, Zhengquan; Sun, Jing Report Mar 1, 2009 5139
Protect your data! Easter, Joseph S. Feb 15, 2009 748
IT security. Feb 1, 2009 358
New ISACA business model. Feb 1, 2009 331
HUSTINX ENTERS SECOND TERM. Brief article Jan 7, 2009 146
Top-secret files sold with camera. Brief article Jan 1, 2009 129
Chinese hackers crack White House network. Brief article Jan 1, 2009 191
Keeping in sync. Mortimore, Kent Jan 1, 2009 1181
Teaching the Ishikawa's "fishbone" as a planning tool: responsibility and action planning matrices applied to airport security and network security. Parayitam, Satyanarayana; Desai, Kiran; Desai, Mayur S.; Eason, Mary K. Report Jan 1, 2009 6545
Safe and secure: a whole-disk encryption solution safeguards laptop data and simplifies data security management for a pediatric system. Dec 1, 2008 1547
Engineering human security. Guba, Robert Dec 1, 2008 662
Protect data from employees. Nov 1, 2008 476
Route analytics keeps power on: end-to-end visibility into its critical Layer 3 infrastructure protects utility's data. Henthorn-Iwane, Alex Nov 1, 2008 605
It's better to be safe ... backup devices help prevent crucial data loss. Donaldson, Sonya A. Nov 1, 2008 415
Law Enforcement Online. Oct 1, 2008 388
UK academics turn off tap of online data. Oct 1, 2008 405
Five data validation cases. Simkin, Mark G. Report Sep 22, 2008 3551
Hacker leaks six million Chilean private records. Swartz, Nikki Brief article Sep 1, 2008 108
Spam, cybercrime linked (duh!). Brief article Sep 1, 2008 307
The biggest threat: end-users: education, processes and technology can help alleviate insider security issues. Wittig, Mike Sep 1, 2008 572
Lock it down: Laptop Security requires multiple strategies. Holl, Suzanne M. Sep 1, 2008 753
"Self-service" storage: has its moment arrived? Hough, Geoff Aug 1, 2008 1547
Information security forum lays out vision. Brief article Aug 1, 2008 195
Analyzing the TJ Maxx data security fiasco. Berg, Gary G.; Freeman, Michelle S.; Schneider, Kent N. Aug 1, 2008 1979
Penetration testing: why franchise systems need information security: regular penetration testing of applications and system security are necessities which will help mitigate the risk of a data breach and system compromises. Chan, Henfree; Schaeffer, Bruce S. Aug 1, 2008 1954
Lock the network's back door: secure remote-management appliances provide visibility and control, even during a network outage. Cox, Barry Jul 1, 2008 555
Calming the data storm: a risk management model for mitigating risks: using a risk-based approach for prioritizing efforts to mitigate the greatest information risks is a smart way to alleviate the common problems of limited staff, time, and budget. Rush, Michelle; Vednere, Ganesh Jul 1, 2008 3256
Data Safety Monitoring Boards: what role do they play in clinical research? Cronin, Valerie Brief article Jul 1, 2008 228
Management tool: AFSO21 Continuous Process Improvement. Henderson, Dan Jun 22, 2008 1502
NAIC gets earful over market data collection and storage. Connolly, Jim Jun 2, 2008 870
Data is king, but who owns it? Trembly, Ara May 19, 2008 768
Spotting some simple vulnerabilities. Carr, Matthew Column May 1, 2008 1800
Managing Knowledge Security. Brief article May 1, 2008 224
Computer security: enabling the digital lifestyle. O'Dell, Robert May 1, 2008 1247
The federated advantage: data exchange between healthcare organizations in RHIOs is a hot topic. Can federated models end the debate? Hurd, Andy Apr 1, 2008 1982
Keeping an eye on the network: campuses deploy network access control to protect users and the network. Powers, Vicki Mar 1, 2008 2685
Security role is evolving. Feb 1, 2008 295
The myths of e-mail governance. Jan 1, 2008 351
Security brought to light: IPSec VPN provides users with either Web-delivered "thin client" or clientless browser access. Jan 1, 2008 806
Securing Data 101. Swartz, Nikki Jan 1, 2008 369
Information security standards: the 10 keys to protecting your network. Lindenmayer, Gerhard Dec 1, 2007 745
Documentation, recordkeeping and risk management. Vaughn, Lisa D. Report Dec 1, 2007 2476
Technology: just a part of the security puzzle. Britt, Phillip Dec 1, 2007 1372
Better strategies mean better corporate security. Britt, Phillip Nov 1, 2007 1310
U.S. government secrecy on the rise. Swartz, Nikki Nov 1, 2007 363
Beyond step: with a new standard, CNC machines can read CAD and CAM files directly. Thilmany, Jean Oct 1, 2007 1812
CARS update. Oct 1, 2007 794
VP challenges classified data order. Swartz, Nikki Sep 1, 2007 551
VistA modernization concerns. Brief article Aug 1, 2007 232
Security and outsourcing: negotiate early. Wagley, John Aug 1, 2007 589
Data Disaster? Brief article Aug 1, 2007 84
Keeping secrets: how to protect your computer form snoops and spies. Callahan, Theo Jul 1, 2007 1400
Reactive vs. proactive security. Chesla, Avi Jul 1, 2007 611
The theater of RFID. Forger, Gary Editorial Jun 1, 2007 423
Is critical data protected? Vosburgh, Craig Jun 1, 2007 503
Train employees and officials to be ready for privacy challenges. Bernstein, Joan E. Jun 1, 2007 2650
New Jersey Library conference covers privacy and freedom. Dempsey, Kathy Jun 1, 2007 929
Defending against hacks. Rothke, Ben Brief article Jun 1, 2007 255
The Reserve Bank's policy on outsourcing by banks. Ng, Tim Jun 1, 2007 2734
K-12 leaders call for an enterprising approach to data management: in a new survey, district officials voice a desire to cross over to data systems traditionally exclusive to business. May 1, 2007 336
Safeguarding and monitoring data transmission: a Honolulu-based healthcare enterprise safeguards against confidential data leaks. Brown, E. Victor Mar 1, 2007 1455
Infosecurity Europe 2007: a selection of papers from exhibitors at Infosecurity Europe 2007, Europe's dedicated information security event. Now in its 12th year, providing an education programme, new products & services, over 300 exhibitors and 11,600 visitors from every segment of the industry. 24th - 26th April 2007, grand hall, Olympia. Mar 1, 2007 6088
Locked down not out: a swarm of portable technologies is creating security headaches for school districts, as they must wrestle, with opposing needs: how to protect the network from unauthorized use while still keeping it accessible to staff and students. Waters, John K. Feb 1, 2007 2740
Could fax be the weak link in your security chain? Huff, Phil Feb 1, 2007 861
Tightening security in 2007. Britt, Phillip Feb 1, 2007 1261
Facial image system helps protect patient data, safety. Zwillich, Todd Jan 1, 2007 441
CDP--buzz versus benefit. Roudebush, Bob Jan 1, 2007 1556
Securing the network for industrial infrastructure. Truican, Ion; Dan, Stefan; Kristaly, Dominic Mircea; Bujdei, Catalin Jan 1, 2007 2091
Preventing financial data drain. Britt, Phillip Column Jan 1, 2007 1081
ISO 27001 risk management and compliance. Brenner, Joel Jan 1, 2007 1852
Plugging information leaks. Miller, Ron Jan 1, 2007 2293

Terms of use | Copyright © 2017 Farlex, Inc. | Feedback | For webmasters