Results tagged "data privacy"
Total Search Results : 11
Cisco's Connect Cloud Policy Change Was Bad Business
July 06, 2012 01:02 PM
Late last month, Cisco started requiring users to create Connect Cloud accounts to manage their routers, and changed its policy to allow data collection and retention. The company has changed course; find out why that's for the best.Code Green Plugs Data Leaks
November 15, 2007 07:17 PM
Code Green Networks' DLP product is good with alerts, but requires help with prevention.Rolling Review: WatchFire AppScan
October 05, 2007 04:00 AM
AppScan was the only product in this Rolling Review to handle Ajax, and it did it without the gotchas that plagued rivals. Now that's hot.Rolling Review: Acunetix Finishes Strong
October 05, 2007 04:00 AM
The final entry in our Web application scanner review easily makes our short list.Rolling Review Introduction: Extrusion-Prevention Systems
March 16, 2007 04:00 AM
In this kickoff to our extrusion-prevention rolling review, we analyze the market, lay out the vendor invitation and describe the test bed. In future issues, we'll test products in ourCan Microsoft Lead on Data Privacy?
November 03, 2006 05:00 AM
The Redmond giant recently released groundbreaking guidelines aimed at helping software and service developers address privacy concerns.Arthur W. Coviello Jr., CEO, RSA Security
August 25, 2006 04:00 AM
Arthur W. Coviello Jr. is Chief Executive Officer at RSA Security, which specializes in protecting online identities and digital assets. In this interview, Coviello discusses Internet crime, privacy protection, terrorismDown to Business: Back to Security Basics
January 13, 2006 05:00 AM
Let's go back to Security 101: creating formal policies on accessing, distributing, storing and transporting critical data. And, of course, define severe consequences for failing to follow the rules.Top 10 Mobile Device Privacy Policies
September 01, 2005 04:00 AM
A leading privacy consultant provides 10 ways to reduce the risk that confidential information will be accessed from lost or stolen mobile devices.The Threat From Within
August 01, 2005 04:00 AM
Vigilance is the best defense against malicious insiders attempting to steal sensitive information. (Originally published in IT Architect)1 | 2 | Next Page »










