Email Alerts
-
Data breach at TJX could affect millions
Retailer TJX Companies said a hacker gained access to its systems exposing the credit card data of millions of customers. Article
-
Federal government pushes full disk encryption
Businesses need to follow the federal government's lead in reducing data breaches by holding employees responsible and examining full disk encryption (FDE) products. Column
-
More users increase risk for Volkswagen AG
With 1.5 million users on the network, Volkswagen AG depends more than ever on strong ID and access management to safeguard intellectual property, according to its CISO. Article
-
Cisco software vulnerable to attack
Cisco's Clean Access software and Clean Access Manager are at risk to attack. A malicious user can access a database snapshot and download it without authentication. Article
-
IT compliance success doesn't equal security success
While compliance needs may help boost an information security department's budget, using the compliance card to receive more funding can cause more harm than good. In this tip, contributor Khalid Kark, Senior Analyst at Forrester Research explains wh... Tip
-
IBM to acquire compliance software firm
IBM plans to acquire Consul Risk Management Inc., a Delft, Netherlands-based firm whose software tracks non-compliant behavior of employees. Article
-
Financial firms balance secure access, simplicity
Securing $5 billion worth of investment portfolios while allowing easy access for customers are just a few of the challenges investment firms meet. News
-
Are companies ready to trust DHS database?
DHS is trying to convince private companies that any information submitted to the National Asset Database will be protected. It remains to be seen if the agency is succeeding. Article
-
Reusing backup tapes: Best practices
Backup expert Curtis Preston offers advice on reusing tape. Ask the Expert
-
How to create guidelines for using removable storage devices
Removable storage devices often sneak past the security radar; Expert Shon Harris explains how to incorporate portable storage into your organization's security policy. Ask the Expert
Security Management Strategies for the CIO