protecting

Protecting data against modern threats

Protecting data against modern threats

Comprehensive data security is multi-faceted, addresses the entire flow of data, and must consider various factors requiring simple and unified management, according to Websense's Adam Bradley.
Sep 24 2010 5:07PM Security
Encryption protecting most mobile phones cracked

Encryption protecting most mobile phones cracked

Crack can be done with widely available open-source tools.
Angela Moscaritolo Jan 6 2010 12:08PM Security
Protecting customer information

Protecting customer information

Enterprises still seem to have turned a blind eye to the vulnerability that exists when information, in document and spreadsheet form, leaves the company via email and laptops.
Brian Dirking, principal product director, Oracle Nov 25 2008 4:30PM Security
It's time to think differently about protecting data

It's time to think differently about protecting data

The recent rash of high profile security breaches, data loss incidents and associated fraud highlights the fact that the security industry is failing to meet the threats.
Bill Ledingham, CTO, Verdasys Sep 16 2008 7:47AM Security
Protecting the IPTV/VoD infrastructure

Protecting the IPTV/VoD infrastructure

To ensure the success of their new IPTV/VoD services, providers must build into their networks a comprehensive, network-centric security strategy right from the start.
Scott Heinlein, Juniper Networks, Inc. Apr 28 2008 12:17PM Security
Protecting your data from the Trojan force

Protecting your data from the Trojan force

So many application-level zero-day exploits exist today that the question is not whether your computers are safe but what's already running on them.
Marco Peretti Apr 8 2008 8:26AM Security
Protecting cardholder data in e-Commerce transactions

Protecting cardholder data in e-Commerce transactions

More and more businesses are moving towards offering their products and services in an Internet-based environment and consumers will typically use a credit or debit card for e-commerce transactions.
Staff Writers Sep 28 2007 10:48AM Security
Protecting the king, as well as the castle

Protecting the king, as well as the castle

A new type of threat has emerged that poses a significant risk to businesses - this threat is real. There are examples of it in the news. There are security experts who are warning against the risk. So why are most companies ignoring it?
Jim Doherty, Aug 2 2007 3:53PM Security
UK web shoppers not protecting themselves

UK web shoppers not protecting themselves

UK - OFT report says consumers and businesses could do more to reduce risk.
Robert Jaques Jun 20 2007 3:40PM Security
Protecting the enterprise in a Vista environment

Protecting the enterprise in a Vista environment

Microsoft’s new Vista operating system has placed more emphasis on security than any previous version of Windows.
Paul Henry Mar 7 2007 10:50AM Security
Protecting your company's good name outside of the network

Protecting your company's good name outside of the network

Over the last several years, many well-known organisations have faced the consequences of highly publicised data breaches. These breaches directly impact an organisation's most valuable asset - their customers.
Joe Sturonas, Jan 29 2007 6:33AM Security
Protecting your assets

Protecting your assets

The flooring of the Russian stock exchange by malware earlier this year served as a wake-up call for many financial institutions and at the same time brought to mind a recognised computer attack technique: take a system down prior to launching the 'real' attack.
Phil Gould Mar 7 2006 3:18PM Security
Protecting your investment in VoIP

Protecting your investment in VoIP

Within the next two years, most businesses will either pilot or start widescale deployments of voice over IP (VoIP). Why? To extend the capabilities of their phone system, as well as realize significant cost savings.
Goren Fink Dec 19 2005 10:21PM Security
Protecting the borderless enterprise

Protecting the borderless enterprise

The well-publicized cases of information leakage in recent news articles have brought to light the risks of the borderless enterprise.
Staff Writers May 16 2005 11:30AM Security
Protecting IP - technology not the answer

Protecting IP - technology not the answer

Intellectual property theft from companies could become more of a problem as technology improves.
Claire Doble Sep 29 2004 12:00AM Security
Is reactive patching the answer to protecting against known vulnerabilities?

Is reactive patching the answer to protecting against known vulnerabilities?

The time in which it takes hackers to write malicious code to exploit a known vulnerability is rapidly shrinking. The appearance of the Sasser worm in the shortest time ever, just 18 days between the revealing of a Microsoft vulnerability and the beginning of an attack, marks a new low point in the fight against cyber crime. With the protective window of opportunity getting ever smaller, the task of patching vulnerable software is becoming an increasingly endless one.
David Williamson Jun 29 2004 2:58PM Security
Protecting our Children - You Need to Read This!

Protecting our Children - You Need to Read This!

It's no secret that we now live in a world where technical changes are coming at us at an ever-increasing rate.
Jack Wiles Jan 16 2004 2:46PM Security
Protecting Consumer Privacy Is as Easy

Protecting Consumer Privacy Is as Easy

In his last column [www.infosecnews.com/opinion/2002/05/15_04.htm], Bill Van Emburg discussed the urgent requirement for companies to address the privacy of their customers' data.
Bill Van Jan 16 2004 12:57PM Security
Protecting Documents and Data Shouldn’t Stop at the Server

Protecting Documents and Data Shouldn’t Stop at the Server

There are two types of companies.
Bob Brennan Jan 15 2004 1:38PM Security
Database security: protecting sensitive and critical information

Database security: protecting sensitive and critical information

Bankers would be considered negligent if they locked a bank’s outer doors and left the vault’s doors open at night.
Scott C. Jan 12 2004 3:03PM Security

Log In

  |  Forgot your password?