News

Data security strategies and governance

  • July 13, 2006 13 Jul'06

    NIPP may not address realities of information security

    The Department of Homeland Security has issued the final version of the National Infrastructure Protection Plan, but some say it falls short of being a comprehensive risk management framework for the nation's infrastructure.

  • July 07, 2006 07 Jul'06

    Credant helps IT shops secure mobile technology

    Product review: Though some features need work, Mobile Guardian Enterprise Edition 5.1 achieves its main mission of protecting confidential data on portable devices.

  • June 06, 2006 06 Jun'06

    Easy hacks still tripping up corporate victims

    Analysts at this year's Gartner IT Security Summit explain how thieves are becoming data theft mavens by using freely available tools to hijack sensitive data from stolen PC.

  • May 24, 2006 24 May'06

    Does email archiving mean keep everything?

    An expert at the Storage Decisions conference weighs in on whether it makes sense to keep data forever or if reducing data also reduces risk. Plus dirt on conniving lawyers and dodgy tape practices.

  • May 12, 2006 12 May'06

    Security Blog Log: Data storage bills go to extremes

    This week, lawmakers miss the middle ground when it comes to how long electronic data should be stored. Meanwhile, a hacker defaces electronic subway signs to suggest prime minister is a monster.

  • May 04, 2006 04 May'06

    Where hard drives go to die, or do they?

    A number of enterprises are using asset disposal firms to ensure sensitive corporate data is destroyed, but the process is hardly foolproof. In fact, a convicted felon could have his hands on your data right now.

  • May 03, 2006 03 May'06

    Digital doomsday can be avoided with preparation

    The U.S. Cyber Consequences Unit says enterprises must take specific measures to shore up their defenses, otherwise they could be vulnerable to attackers who not only steal data, but also manipulate it.

  • March 13, 2006 13 Mar'06

    New freeware takes some mystery out of rogue files

    Endpoint security provider Bit9 today unveils a free search engine that tells users a file's origin, thus helping reduce unwanted software on desktops, laptops and servers.

  • August 01, 2005 01 Aug'05

    Attack: USB could be the death of me

    Seemingly innocent Universal Serial Bus driver bugs may allow device attacks that many won't see coming, according to Black Hat presenters.

  • February 01, 2005 01 Feb'05

    ID theft remains No. 1 worry

    For the fifth straight year, the FTC said most complaints came from identity theft victims. And that's a problem for enterprises.

  • December 14, 2004 14 Dec'04

    HP improves backup-to-disk features

    Cashing in on the wave of interest in disk-to-disk backup, HP has upgraded its Data Protector software to support continuous backups and the ability to recover directly from the target.

  • September 27, 2004 27 Sep'04

    Authorize.Net says it has 'learned' from attack

    The credit card processing service was unprepared for the kind of attack it suffered last week, but it will use the experience to improve security.

  • May 17, 2004 17 May'04

    Consequences of Cisco source code theft unclear

    Opinions are divided on the impact of stolen data now circulating on the Internet.

  • April 15, 2004 15 Apr'04

    Concerns raised on tape backup methods

    Flaws in tape-based data backup may be leaving enterprises without key information and could lead to legal exposure, experts say.

  • June 10, 2003 10 Jun'03

    Data Center Futures: Security demands come together in data center

    Data centers have a lot riding on keeping the "crown jewels" of IT secure. But changes to the IT landscape, such as the increase in outsourcing, are putting some at risk.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close