protecting

Protecting data against modern threats

Protecting data against modern threats

Comprehensive data security is multi-faceted, addresses the entire flow of data, and must consider various factors requiring simple and unified management, according to Websense's Adam Bradley.
Sep 24 2010 5:07PM
Encryption protecting most mobile phones cracked

Encryption protecting most mobile phones cracked

Crack can be done with widely available open-source tools.
Jan 6 2010 12:08PM
Protecting customer information

Protecting customer information

Enterprises still seem to have turned a blind eye to the vulnerability that exists when information, in document and spreadsheet form, leaves the company via email and laptops.
Nov 25 2008 4:30PM
It's time to think differently about protecting data

It's time to think differently about protecting data

The recent rash of high profile security breaches, data loss incidents and associated fraud highlights the fact that the security industry is failing to meet the threats.
Sep 16 2008 7:47AM
Protecting the IPTV/VoD infrastructure

Protecting the IPTV/VoD infrastructure

To ensure the success of their new IPTV/VoD services, providers must build into their networks a comprehensive, network-centric security strategy right from the start.
Apr 28 2008 12:17PM
Protecting your data from the Trojan force

Protecting your data from the Trojan force

So many application-level zero-day exploits exist today that the question is not whether your computers are safe but what's already running on them.
Apr 8 2008 8:26AM
Protecting cardholder data in e-Commerce transactions

Protecting cardholder data in e-Commerce transactions

More and more businesses are moving towards offering their products and services in an Internet-based environment and consumers will typically use a credit or debit card for e-commerce transactions.
Sep 28 2007 10:48AM
Protecting the king, as well as the castle

Protecting the king, as well as the castle

A new type of threat has emerged that poses a significant risk to businesses - this threat is real. There are examples of it in the news. There are security experts who are warning against the risk. So why are most companies ignoring it?
Aug 2 2007 3:53PM
UK web shoppers not protecting themselves

UK web shoppers not protecting themselves

UK - OFT report says consumers and businesses could do more to reduce risk.
Jun 20 2007 3:40PM
Protecting the enterprise in a Vista environment

Protecting the enterprise in a Vista environment

Microsoft’s new Vista operating system has placed more emphasis on security than any previous version of Windows.
Mar 7 2007 10:50AM
Protecting your company's good name outside of the network

Protecting your company's good name outside of the network

Over the last several years, many well-known organisations have faced the consequences of highly publicised data breaches. These breaches directly impact an organisation's most valuable asset - their customers.
Jan 29 2007 6:33AM
Protecting your assets

Protecting your assets

The flooring of the Russian stock exchange by malware earlier this year served as a wake-up call for many financial institutions and at the same time brought to mind a recognised computer attack technique: take a system down prior to launching the 'real' attack.
Mar 7 2006 3:18PM
Protecting your investment in VoIP

Protecting your investment in VoIP

Within the next two years, most businesses will either pilot or start widescale deployments of voice over IP (VoIP). Why? To extend the capabilities of their phone system, as well as realize significant cost savings.
Dec 19 2005 10:21PM
Protecting the borderless enterprise

Protecting the borderless enterprise

The well-publicized cases of information leakage in recent news articles have brought to light the risks of the borderless enterprise.
May 16 2005 11:30AM
Protecting IP - technology not the answer

Protecting IP - technology not the answer

Intellectual property theft from companies could become more of a problem as technology improves.
Sep 29 2004 12:00AM
Is reactive patching the answer to protecting against known vulnerabilities?

Is reactive patching the answer to protecting against known vulnerabilities?

The time in which it takes hackers to write malicious code to exploit a known vulnerability is rapidly shrinking. The appearance of the Sasser worm in the shortest time ever, just 18 days between the revealing of a Microsoft vulnerability and the beginning of an attack, marks a new low point in the fight against cyber crime. With the protective window of opportunity getting ever smaller, the task of patching vulnerable software is becoming an increasingly endless one.
Jun 29 2004 2:58PM
Protecting our Children - You Need to Read This!

Protecting our Children - You Need to Read This!

It's no secret that we now live in a world where technical changes are coming at us at an ever-increasing rate.
Jan 16 2004 2:46PM
Protecting Consumer Privacy Is as Easy

Protecting Consumer Privacy Is as Easy

In his last column [www.infosecnews.com/opinion/2002/05/15_04.htm], Bill Van Emburg discussed the urgent requirement for companies to address the privacy of their customers' data.
Jan 16 2004 12:57PM
Protecting Documents and Data Shouldn’t Stop at the Server

Protecting Documents and Data Shouldn’t Stop at the Server

There are two types of companies.
Jan 15 2004 1:38PM
Database security: protecting sensitive and critical information

Database security: protecting sensitive and critical information

Bankers would be considered negligent if they locked a bank’s outer doors and left the vault’s doors open at night.
Jan 12 2004 3:03PM

Log In

Email:
Password:
  |  Forgot your password?