data

CBL helps out HP clients

CBL helps out HP clients

CBL Data Recovery Technologies has been appointed by HP to provide data recovery services in Australia, China, India, Singapore and Taiwan.
Lilia Guan Oct 18 2006 12:56PM Hardware
Sun offers data centre in a shipping container

Sun offers data centre in a shipping container

'Black Box' computing package offers 1.5 petabytes of storage.
Tom Sanders Oct 18 2006 8:52AM Storage
IBM touts Linux-based data warehouse package

IBM touts Linux-based data warehouse package

Offering combines software, server and storage technologies.
Robert Jaques Oct 18 2006 8:52AM Storage
Symantec shifts focus to data security

Symantec shifts focus to data security

Parnterships with Verisgn, Accenture to take deliver "Security 2.0".
Tom Sanders Oct 11 2006 9:59AM Security
Customer data stolen at Indian call centres

Customer data stolen at Indian call centres

Employees in outsourced call centres are stealing sensitive customer data and selling it on the black market, an investigation has found.
Fiona Raisbeck Oct 4 2006 5:20PM Security
LogMeIn offers data shredding for stolen laptops

LogMeIn offers data shredding for stolen laptops

Sensitive information deleted when thief goes online.
Andrew Charlesworth Sep 29 2006 10:05AM Security
Portable data menace goes unchecked

Portable data menace goes unchecked

Companies risk espionage and prosecution, warns security expert.
Andrew Charlesworth Sep 8 2006 10:13AM Security
MatrixView launches SQZit data compression technology

MatrixView launches SQZit data compression technology

ASX-listed MatrixView is hoping that the commercial release of its SQZit application will see it become a major player in the data compression space.
Staff Writers Sep 4 2006 12:08PM Storage
Opinion: Protect data from your staff

Opinion: Protect data from your staff

The rise in data security breaches and trade secret piracy over the past year is a wake-up call for executives. And the threat posed internally is just as great as that at the perimeter.
Jason Ashley, Aug 14 2006 2:44PM Security
Opinion: Protect data from your staff

Opinion: Protect data from your staff

The rise in data security breaches and trade secret piracy over the past year is a wake-up call for executives. And the threat posed internally is just as great as that at the perimeter.
Jason Ashley, Aug 14 2006 2:44PM Security
ID Analytics to monitor retrieved VA data

ID Analytics to monitor retrieved VA data

ID Analytics will conduct data breach analysis for the Department of Veterans Affairs to ensure that personal information of millions of veterans and current members of the military was not misused, the department announced this week.
Frank Washkuch Aug 11 2006 5:45PM Security
Critical data found on second-hand hard drives

Critical data found on second-hand hard drives

Organizations and individuals are still leaving critical data on disks later sold on through online auctions and computer fairs, according to a new study.
René Millman Aug 10 2006 12:23PM Security
Review: Dekart Private Disk

Review: Dekart Private Disk

Dekart’s approach to encryption is innovative, albeit using accepted standards where appropriate. The company offers a range of useful security-related products and utilities, within which Private Disk plays an important part.
Julian Ashbourn Aug 9 2006 12:00AM Security
Review: DeskCrypt

Review: DeskCrypt

One of the issues with software encryption systems is that you have to take care to have all the relevant software elements, certificates and so on precisely configured and in place. One little slip-up and you may find yourself locked out of your own data.
Julian Ashbourn Aug 9 2006 12:00AM Security
Debate: Congress should make data breach legislation a priority

Debate: Congress should make data breach legislation a priority

Congress should make data breach legislation a priority.
Bill Geime, Aug 7 2006 9:31PM Security
Review: DESlock+

Review: DESlock+

DESlock+ is a useful and comprehensive collection of encryption tools for Windows environments, packaged in an intuitive, easy-to-use manner.
Julian Ashbourn Aug 1 2006 12:00AM Security
Review: DeviceWall

Review: DeviceWall

Even comprehensive security at the desktop and network periphery can sometimes be defeated by something as simple as a USB stick or mobile device. But solutions have been few and far between.
Julian Ashbourn Aug 1 2006 12:00AM Security
Review: ProtectDrive

Review: ProtectDrive

ProtectDrive encrypts disk drives, either wholly or in part, an approach that may well appeal to organizations or government agencies which run a fleet of laptops, or have multi-user access to fixed workstations. In such cases, concerns about data being misappropriated from the disk drives, should they fall into the wrong hands, can be very real.
Julian Ashbourn Aug 1 2006 12:00AM Security
Review: SecureDoc

Review: SecureDoc

This is not just a simple plug-and-play product. It is perhaps better thought of as an encryption methodology for those who understand IT security and wish to incorporate robust protection for sensitive data resident on their hard drives or portable media.
Julian Ashbourn Aug 1 2006 12:00AM Security
Need to secure apps, data from 'Insiders' being overlooked

Need to secure apps, data from 'Insiders' being overlooked

There's lots of talk in the industry about how companies can guard against outside IT and network threats. But what can they do to shield themselves from the possibility of in-house developers, consultants, testers and other tech-savvy "insiders" entering malicious code or gaining access to live data?.
Mario Morejon Jul 21 2006 10:05AM Software

Log In

  |  Forgot your password?