News

News

  • January 17, 2008 17 Jan'08

    Disaster recovery, security drive financial firm to Private IP

    A financial firm picked Private IP to connect branch offices, build a disaster recovery site, and secure customer info. Also, the company will have fewer management headaches.

  • January 17, 2008 17 Jan'08

    Federated ID: Still not ready for prime time

    At the Burton Group Catalyst Conference, analysts will outline obstacles that keep federation technology from going mainstream, despite its potential to solve big business security problems.

  • January 17, 2008 17 Jan'08

    TD Ameritrade database hacked, customer data stolen

    Hackers stole data including customer names, addresses and phone numbers from the online broker's database.

  • January 17, 2008 17 Jan'08

    BlackBerry flaw highlights growing mobile device risks

    Mobile security issues have been making waves, and following a recently revealed BlackBerry vulnerability, it's time to take notice.

  • January 17, 2008 17 Jan'08

    Who, or what, is reading your email?

    According to a new survey, fear of data leaks has caused many large companies to hire staff specifically to read and analyze outbound employee email.

  • January 17, 2008 17 Jan'08

    When relationships end, so does security

    It is often said that the trusted user is any enterprise's greatest security threat. However, what defenses exist for the threat posed by the people who trusted users trust – girlfriends, boyfriends, spouses and significant others? As Edmund X...

  • January 17, 2008 17 Jan'08

    VoIP: Is anyone responsible for security?

    A panel of experts discuss the drawbacks of VoIP and who, ultimately, is in charge of its security.

  • January 17, 2008 17 Jan'08

    Messaging techniques spawn new security policies

    Gartner IT Security Summit: As people use a growing variety of messaging programs in the workplace, companies are being forced to create new policies to minimize crossover threats.

  • January 17, 2008 17 Jan'08

    WebEx addresses ActiveX flaw

    The Web conferencing leader has patched an ActiveX flaw that could have enabled an attacker to gain access to sensitive data.

  • January 17, 2008 17 Jan'08

    All I want for Christmas are some laws with teeth

    From a state breach-notification law spreading nationwide to a spam king that legal eagles finally nailed, 2005 marked a turning point in data security. But we've got suggestions on how to do more.

  • January 17, 2008 17 Jan'08

    FFIEC, HSPD-12 fuel growth in authentication market

    Enterprises aren't the only ones who have had to deal with regulations like FFIEC and HSPD-12. The vendor community has adjusted by offering cost-effective and unobtrusive authentication products, primarily focused on financial institutions.

  • January 17, 2008 17 Jan'08

    Black Hat 2007: For financial firms, availability too often trumps security

    Researchers say startling weaknesses in key protocols such as FIX and an addiction to availability have left the financial services industry in need of a security wake-up call.

  • January 17, 2008 17 Jan'08

    SOA, Web services security hinge on XML gateways

    XML security gateways could be the missing piece in most SOA deployments, says Tim Bond, a senior security engineer at webMethods Inc.

  • January 17, 2008 17 Jan'08

    A security tale: From vulnerability discovery to disaster

    A security practitioner discovers a gaping hole that puts millions' personal and financial data at risk. Then the real shock begins.

  • January 17, 2008 17 Jan'08

    Banks neglect responsibility for data breaches, some say

    TJX has become the poster child for bad data behavior, but some believe the bank and credit card companies aren't accepting enough responsibility for the data breach epidemic.

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

ComputerWeekly.com

Close