News

News

  • March 03, 2008 03 Mar'08

    Banks, telephone companies top identity theft study

    Research conducted at the University of California, Berkeley highlights which companies are targeted most by identity thieves.

  • February 22, 2008 22 Feb'08

    Cryptography's future

    Dr. Burt Kaliski is chair of the office of the CTO and vice president of research at RSA Security, the security division of EMC. He is also chief scientist of its research center, RSA Laboratories. He joined RSA Data Security in 1989 and helped ...

  • February 14, 2008 14 Feb'08

    Phishers targeting smaller financial firms, credit unions

    Financial institutions remain a target of phishing attacks, but it's no longer just the biggest firms that are under assault. Fortunately, companies are finding ways to fight back.

  • February 13, 2008 13 Feb'08

    How to survive a data breach

    When Colin Crook offers advice on how companies should deal a security breach, he speaks from experience. He was CTO of Citicorp [now Citigroup, parent company of Citibank] over 10 years ago when a hacker penetrated the company's network....

  • February 12, 2008 12 Feb'08

    New remote access system cuts costs

    When it comes to application management, IT managers often face a balancing act between security and cost. In this case study, one financial services firm explains why it replaced its Citrix presentation server with Ericom.

  • February 04, 2008 04 Feb'08

    Survey discovers access control problems at many firms

    Despite growing data breach dangers as a result of trusted insiders, many firms are failing to implement a strong access governance program, according to a recent survey.

  • January 18, 2008 18 Jan'08

    Missing backup tape prompts identity theft fears for JC Penney customers

    The personal information of about 650,000 customers was put at risk after a backup tape, stored at a warehouse run by Iron Mountain Inc., disappeared.

  • January 18, 2008 18 Jan'08

    GLBA's focus on data security has helped financial services, say industry observers

    While few financial services organizations enjoy the work that comes with ensuring its security measures are compliant with the Gramm-Leach-Bliley Act, experts and industry observers say there's no question that GLBA has helped foster stronger ...

  • January 18, 2008 18 Jan'08

    HIPAA: Clean bill of health, or dying a slow death?

    HIPAA has changed the way a lot of healthcare companies handle data, but the fact that no one has been fined or jailed for non-compliance makes one wonder if they'll keep up with it.

  • January 17, 2008 17 Jan'08

    RSA 2006: A one-size-fits-all approach to compliance?

    IT security professionals are looking for a better blueprint to meet the common demands of multiple regulations. But does such a blueprint really exist?

  • January 17, 2008 17 Jan'08

    IT pros impede PCI, Sarbanes Oxley compliance

    The biggest barrier to collaboration between IT and compliance professionals is the lack of understanding about risk and compliance issues by corporate IT, according to a survey.

  • January 17, 2008 17 Jan'08

    Feds 'banking' on financial industry to tell us we're for real

    U.S. regulators are demanding banks and other phish-friendly industries increase their online security within the next year. As usual, recommendations are loosely written and vendors are capitalizing on all the options.

  • January 17, 2008 17 Jan'08

    Banking on security checks and balances

    Financial firms like Clarke American face danger from every corner of cyberspace and sometimes from within. The company's CISO explains how he's using a combination of defenses and strategies to keep threats at bay.

  • January 17, 2008 17 Jan'08

    Analyst: Stopping spam is for the security admin

    SAN FRANCISCO -- Is spam a security administrator's problem? It is, according to Gartner Inc. Enterprise Messaging Research Director Maurene Grey. Grey recently gave a talk on spam filtering at a Sprint user event. Among the things she discussed ...

  • January 17, 2008 17 Jan'08

    All I want for Christmas are some laws with teeth

    From a state breach-notification law spreading nationwide to a spam king that legal eagles finally nailed, 2005 marked a turning point in data security. But we've got suggestions on how to do more.

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

ComputerWeekly

Close