data

Opinion: Protect data from your staff

Opinion: Protect data from your staff

The rise in data security breaches and trade secret piracy over the past year is a wake-up call for executives. And the threat posed internally is just as great as that at the perimeter.
Jason Ashley, Aug 14 2006 2:44PM Security
ID Analytics to monitor retrieved VA data

ID Analytics to monitor retrieved VA data

ID Analytics will conduct data breach analysis for the Department of Veterans Affairs to ensure that personal information of millions of veterans and current members of the military was not misused, the department announced this week.
Frank Washkuch Aug 11 2006 5:45PM Security
Critical data found on second-hand hard drives

Critical data found on second-hand hard drives

Organizations and individuals are still leaving critical data on disks later sold on through online auctions and computer fairs, according to a new study.
René Millman Aug 10 2006 12:23PM Security
Review: Dekart Private Disk

Review: Dekart Private Disk

Dekart’s approach to encryption is innovative, albeit using accepted standards where appropriate. The company offers a range of useful security-related products and utilities, within which Private Disk plays an important part.
Julian Ashbourn Aug 9 2006 12:00AM Security
Review: DeskCrypt

Review: DeskCrypt

One of the issues with software encryption systems is that you have to take care to have all the relevant software elements, certificates and so on precisely configured and in place. One little slip-up and you may find yourself locked out of your own data.
Julian Ashbourn Aug 9 2006 12:00AM Security
Debate: Congress should make data breach legislation a priority

Debate: Congress should make data breach legislation a priority

Congress should make data breach legislation a priority.
Bill Geime, Aug 7 2006 9:31PM Security
Review: DESlock+

Review: DESlock+

DESlock+ is a useful and comprehensive collection of encryption tools for Windows environments, packaged in an intuitive, easy-to-use manner.
Julian Ashbourn Aug 1 2006 12:00AM Security
Review: DeviceWall

Review: DeviceWall

Even comprehensive security at the desktop and network periphery can sometimes be defeated by something as simple as a USB stick or mobile device. But solutions have been few and far between.
Julian Ashbourn Aug 1 2006 12:00AM Security
Review: ProtectDrive

Review: ProtectDrive

ProtectDrive encrypts disk drives, either wholly or in part, an approach that may well appeal to organizations or government agencies which run a fleet of laptops, or have multi-user access to fixed workstations. In such cases, concerns about data being misappropriated from the disk drives, should they fall into the wrong hands, can be very real.
Julian Ashbourn Aug 1 2006 12:00AM Security
Review: SecureDoc

Review: SecureDoc

This is not just a simple plug-and-play product. It is perhaps better thought of as an encryption methodology for those who understand IT security and wish to incorporate robust protection for sensitive data resident on their hard drives or portable media.
Julian Ashbourn Aug 1 2006 12:00AM Security
Need to secure apps, data from 'Insiders' being overlooked

Need to secure apps, data from 'Insiders' being overlooked

There's lots of talk in the industry about how companies can guard against outside IT and network threats. But what can they do to shield themselves from the possibility of in-house developers, consultants, testers and other tech-savvy "insiders" entering malicious code or gaining access to live data?.
Mario Morejon Jul 21 2006 10:05AM Software
Single system speeds police access to data

Single system speeds police access to data

South Wales force gains complete visibility of related case records.
Lisa Kelly Jul 13 2006 2:40PM Storage
Sensitive FBI data hacked

Sensitive FBI data hacked

A former government consultant breached sensitive portions of the FBI's classified computer system to obtain the passwords of 38,000 employees – including that of FBI Director Robert S. Mueller III, according to a report today in the Washington Post.
Frank Washkuch Jul 6 2006 6:38PM Security
UK firms gamble with customer data

UK firms gamble with customer data

Just under half of UK IT directors are breaking the Data Protection Act and putting customer data at risk, according to a study by IT management firm Compuware.
Matt Chapman Jul 5 2006 10:00AM Software
Applications testing breaches data law

Applications testing breaches data law

Firms that test apps using live customer data could be failing the Data
Protection Act.
James Murray Jul 4 2006 9:45AM Software
White House orders feds to improve data security

White House orders feds to improve data security

The federal Office of Management and Budget (OMB) has ordered government agencies to improve their security controls within 45 days.
Ericka Chickowski Jun 28 2006 10:44PM Security
Active duty servicemen also affected by massive VA data breach

Active duty servicemen also affected by massive VA data breach

Active duty members of the U.S. Armed Forces may also have had their personal information compromised in last month’s breach of the personal data of 26.5 million veterans.
Frank Washkuch Jun 5 2006 7:39PM Security
Personnel shakeup at VA follows data breach

Personnel shakeup at VA follows data breach

Secretary of Veterans Affairs R. James Nicholson made a series of personnel changes this week following last month’s theft of the personal data of more than 26.5 million veterans.
Frank Washkuch Jun 1 2006 7:06PM Security
University of Texas suffers second data breach in three years

University of Texas suffers second data breach in three years

More than 197,000 personal records were exposed in a security breach at the McCombs School of Business at the University of Texas, school officials said this week.
Ericka Chickowski Apr 26 2006 6:07AM Security
Holographic breakthrough boosts data encryption and storage

Holographic breakthrough boosts data encryption and storage

Japanese scientists have predicted a bright future for holographic data encryption and storage, promising that holographic technology could be developed to allow massive amounts of encrypted data to be accessed at very high speeds.
William Eazel Apr 18 2006 10:33AM Security

Log In

  |  Forgot your password?