Quantcast
Channel: Blog Posts From Media and Vendor Sponsors Tagged With data_security
Browsing latest articles
Browse All 15 View Live

Protecting Data When an HIE Shuts Down (Healthcare Info Security)

Wisconsin Health Information Exchange Leader Explains Steps http://www.healthcareinfosecurity.com/protecting-data-when-hie-shuts-down-a-5698

View Article



Machine Learning Susses Out Social-Network Fraud (Dark Reading)

Certain characteristics of social-network accounts have a high correlation with fraud and can be used to differentiate between real and fake accounts...

View Article

Boston CIOs Share Lessons Learned (Healthcare Info Security)

Bombings Highlight Need for Business Continuity Plan Scrutiny http://www.healthcareinfosecurity.com/boston-cios-share-lessons-learned-a-5707

View Article

Enhance Your Windows Server Security (Redmond Mag)

There are a variety of features and settings for securing your Microsoft Windows Server infrastructure, so be sure you make the right choice....

View Article

Twitter Preps Two Factor Authentication After AP Hoax (Information Week)

Security move follows a rash of high-profile account takeovers, including a hoax tweet from the Associated Press' account about White House explosions....

View Article


Medical Device Security Advice (Healthcare Info Sec)

Companies that manufacture medical devices can play a key role in ensuring data security issues are addressed. http://www.healthcareinfosecurity.com/blogs/medical-device-security-advice-p-1457

View Article

Tech Insight: Time To Set Up That Honeypot (Dark Reading)

A combination of traditional network security monitoring and recent advancements in honeypot and active defense tools is key to detecting today's threats...

View Article

86% Of Websites Have At Least 1 Serious Vulnerability (Information Week)

While websites harbor fewer bugs overall, 86% of sites have at least one serious flaw that could be used in an attack, reports WhiteHat Security....

View Article


Protecting an Organization's Reputation (Bank Info Security)

Credibility New Target for Cyber-Attacks http://www.bankinfosecurity.com/protecting-organizations-reputation-a-5725

View Article


Medical identity theft to be explored at FTC hearing (SC Magazine)

The Federal Trade Commission next week will host a hearing examining identity theft affecting senior citizens, and a portion of the discussion will focus on the the rising rates and awareness of...

View Article

Sweet Password Security Strategy: Honeywords (Information Week)

To improve detection of database breaches, businesses should store multiple fake passwords and monitor attempts to use them, according to researchers at security firm RSA....

View Article

Big Data Alchemy: Turn Info Into Money (Information Week)

Data markets could become a new market category. Here, companies buy, sell or trade data for mutual benefit....

View Article

Dealing with BYOD Security Risks (Redmond Magazine)

IT is now challenged with implementing personal device security procedures that keeps networks safe from infection and protects data from being lost or stolen....

View Article


Using Big Data to Predict Attacks (Bank Info Security)

How Data Analysis Speeds Detection, Response http://www.bankinfosecurity.com/using-big-data-to-predict-attacks-a-5760

View Article

Web Application Testing Using Real-World Attacks (Dark Reading)

Using exploits to test Web applications can be an enlightening way to test for vulnerabilities, but there are downsides as well....

View Article

Browsing latest articles
Browse All 15 View Live




Latest Images