Security Archives

 
 
 
RECENT ARTICLES Subscribe
 
 
 
 
 

Conflicts, Trends & Ethical Challenges of Privacy

The intensifying debate over digital privacy demonstrates the vast complexities of this issue. On one hand, users appreciate the advantages of having one-on-one purchasing experiences with companies. That's how, through alerts and other techniques, they quickly find what they need online and save money on the transaction. On the other hand, analytics empowers businesses to collect and use... Read More >

 
 

National Lab Tests Network Fingerprinting System

The Savannah River National Lab is turning to network fingerprinting technology to detect changes in power consumption that can indicate a security breach. Read More >

 
 

Managing Security in Today's App Economy

Cyber-security has emerged as a major challenge for businesses large and small. It increasingly impacts e-commerce, data management, employee collaboration, and a variety of other tasks and processes. In the end, it affects company growth and bottom-line results. A recently released study conducted by research firm Vanson Bourne and sponsored by CA Technologies, "8 Steps to Modernize Security for... Read More >

 
 

Half Work and Half Play Makes Jack a Security Risk

It's probably time to rethink this whole notion of work-life balance. With huge numbers of workers saying that they're using their work devices for personal business and using their personal devices to do work, the line between work and personal business is no longer just blurry. It's virtually nonexistent, and IT security teams must pay attention. That's the key takeaway from a recent survey... Read More >

 
 

The High Cost of Defending Against Malware

One of the unfortunate realities of the digital age is that it's impossible to escape the threat of malware. Emails, Websites, and other tools and technologies all too often carry potentially dangerous payloads that can damage or cripple an enterprise. Most recently, Sony Pictures Entertainment discovered just how destructive malware can be and how it can wreck a company's reputation and cause... Read More >

 
 
ARTICLES BY DATE
 
 
 
 
 
PREVIOUS ARCHIVES >>
 
 

 
 
 
Manage your Newsletters: Login   Register My Newsletters



















 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date