The Stored Communications Act and workplace privacy

Information Security Laws, Investigations and Ethics

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • RSA Conference: Officials say DNS servers stood up well to attack

    Government security officials at RSA Conference 2007 said the Internet's backbone appears to have stood tall against Tuesday's massive DNS server attack. 

  • Is the CAN-SPAM Act a help or a hindrance?

    Three years have passed since CAN-SPAM was enacted, but has this legislation truly contained unsolicited commercial email? In this tip, contributor Joel Dubin examines if the law has effectively cracked down on spamming activities and examines how to... 

  • Group gives government low marks on data protection

    The Cyber Security Industry Alliance, a lobbying group of security vendors, gives the federal government and congress a D-grade for securing sensitive information. 

  • 'Month-of' flaw projects come under fire

    This week in Security Blog Log: The Month of Apple Bugs has some wondering if the real motive for such disclosure projects is better security or better press coverage. 

  • Remote flaw in Vista could earn finder $8,000

    VeriSign Inc.'s iDefense Labs is offering an $8,000 bounty to any researcher who finds a remotely exploitable flaw in Windows Vista. 

  • Congress leaves cybersecurity orphaned

    Senior level officials at the Department of Homeland Security are still unclear over whether the infrastructure protection and cyber security programs will be tied together. 

  • Security rules to live by: Compliance with laws and regulations

    Learn how complying with enterprise and federal laws and regulations affects information security and receive guidelines practitioners can use to protect themselves and their organization, in this excerpt of Chapter 3: Security Rules to Live By from ... 

  • PING with Aviel Rubin

    In this exclusive interview with Information Security magazine, Aviel Rubin, author of "Brave New Ballot" examines security problems in e-voting machines, and details why isn't just a cause for concern, it's a matter of national security. 

  • Feds get a D plus for data security

    An epidemic of data security breaches has swept across the federal government since early 2003, according to the House Committee on Government Reform. 

  • DHS names Washington insider Garcia to head cybersecurity

    After a years-long search for the right candidate, Greg Garcia of the ITAA will become the first assistant secretary for cybersecurity and telecommunications.