Email Alerts
-
Cybersecurity hearing highlights inadequacy of PCI DSS
Lawmakers call the PCI standard lacking and seek significant improvements to the payment processing infrastructure to enhance security. Article
-
Mass., Nev. data protection laws wrong, ineffective
Government should consider extending existing frameworks for fraud, trespassing and trafficking across state and national borders, not legislating technology, explains Eric Ogren. Column
-
HIPAA changes force healthcare to improve data flow
Do you know where your data is? The latest HIPAA changes should motivate healthcare security teams to understand information flows. Column
-
Massachusetts data protection, encryption law extended
Law now taking effect Jan. 1, 2010 would require any business collecting information on Massachusetts residents to encrypt sensitive data, protecting it from data leakage. Article
-
Sensitive data insecure abroad, McAfee report finds
Sensitive customer information and intellectual property is at high risk, especially in developing nations, according to a new survey. Article
-
Recovery plans essential for preventing data loss disasters
If you lose a laptop or USB stick that contains sensitive employee data, do you know what to do next? News
-
Barracuda Networks expands backup service with acquisition
The acquisition of Yosemite Technologies adds support for Microsoft Exchange, SQL-Server and Windows state backup. Article
-
How can mobile device data be lost on a peer-to-peer (P2P) network?
Peer-to-peer telephone services, such as Skype, Free World Dialup (FWD) and Ooma, offer users a way to save significant money on telephone services. But how well do they protect your data? Ask the Expert
-
Oracle to release 41 security fixes
Oracle's Critical Patch Update repairs several serious vulnerabilities in Oracle Secure Backup, Oracle Database, Oracle Application Server and its business suite. Article
-
Comparing FTP vs. TFTP
There are some differences between FTP and TFTP, but here's the catch: both are inherently insecure protocols. Ask the Expert
Security Management Strategies for the CIO