Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
With the proliferation of data breaches, The Harford insurance company is selling a new data loss insurance aimed at small businesses that might be put at financial risk if they lose valuable and sensitive data.
If your company suffered a data breach, would you know what to do to comply with state, federal and local law? Start-up Co3 Systems is offering a software-as-a-service (SaaS) application to tackle that unhappy task, tracking how a corporate data-loss...
After several large breaches -- including the <a href="http://blogs.csoonline.com/1457/epsilon_hack_notification_letters">Epsilon</a>, <a href="http://www.csoonline.com/article/680689/sony-playstation-network-personal-user-data-stolen">Sony</a>, and ...
The business benefits of a cloud computing model have been well stated. You cut costs by switching to more flexible on-demand IT resources that can better handle the ebb and flow technology needs at a company.
Cisco this week announced its intent to acquire privately-held Pari Networks, a provider of network configuration, change and compliance management appliances that was <a href="http://www.networkworld.com/news/2008/013108-network-management-start-up....
A survey of more than 900 IT managers shows that adoption of encryption in their organizations is being driven by two main factors, anxiety about possible cyberattacks and the need to meet the payment-card industry (PCI) data security standards.
The second version of the Payment Card Industry (PCI) Data Security Standard (DSS) is being released this afternoon by the organization PCI Security Standards Council, which sets the network and security requirements for merchants and service provide...
Private sector CIOs appear to be optimistic that the UK government's comprehensive spending review will not have a knock-on effect in their own patch.
Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to safeguard cardholder data from wireless th...
NEW YORK -- A CISO who spent two years organizing identity and access management for the 15,000 users on his network boiled the whole experience down into a 10-step process he presented at the Security Standard Conference this week.
Government needs to better understand the realities of running profitable businesses -- and quickly -- as it imposes security regulations that can affect the profitability of corporations battling in a competitive environment.
Hardly a week goes by when some organization or another doesn't lose some laptops and face a litany of IT security questions. One that always comes up: Were the systems' disks fully encrypted?
The thicket of federal, state, and industry-specific regulations is enormously complex. Most organizations fail to comply with some rules, often due to policy conflicts. The best way for companies to navigate the maze and avoid penalties is to show a...
Latest News Articles
- NTT launches browser-to-browser chatroom with avatars
- Fire at Samsung facility affects website, media portal
- Activists want net neutrality, NSA spying debated at Brazil Internet conference
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
Most Popular Articles
- 1 Top 5 reasons to hate the Samsung Galaxy S5
- 2 What's the difference between an Intel Core i3, i5 and i7?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 Laser vs. inkjet printers: which is better?
- 5 Five flaws in Samsung Galaxy S5's TouchWiz
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.