Results tagged "data security"
Total Search Results : 46
Self-Encrypting Drives Aren't Magic Security Dust
August 13, 2013 06:49 PM
SEDs may be attractive in this time of heightened data security awareness but they're not necessarily a better option than software-based encryption for data protection.Survey: Gen Y Workers Want Mobile Devices; Prep Your BYOD Policies
June 25, 2012 10:36 AM
A new survey finds that one in three Gen Y workers will work around BYOD policies in order to use mobile devices while on the job. Learn why, and how enterprises should tackle the bring-your-own-device dilemma.Big Data Security: The Balance Is Shifting in Favor of IT
June 18, 2012 11:35 AM
There's a perception in the marketplace that encrypting data equals a big performance hit. That's not necessarily the case anymore.Minnesota DoJ Uses Biometrics Streamlining Security, Paperwork
June 02, 2010 08:00 AM
When the Minnesota Department of Justice began its eCharging program, the goals were to streamline workflows and to reduce the amount of paperwork between law enforcement agents in the field and the court system. Paperwork backlogs adversely affected productivity, and law enforcement officers in the field received the added benefit of not having to key in unique user ID and password combination for 10-12 different law enforcement databases that they regularly accessed from laptops in squad cars.Data Security Is A Federal Issue Now
January 27, 2010 09:00 AM
Just when you think you have dodged the data security bullet, here come the Feds. My view on data security of late has been that those who thought they needed to secure information have done it, and those who didn't were not in a big hurry to do it. Times are changing. The Federal Data Breach Notification Law that recently passed through the house is now on its way to the Senate and then on its way to you.How To Assess Offshore Data Security
May 31, 2008 04:00 AM
Secure offshore outsourcing takes similar strategic thinking as in-house work.Your Data And The P2P Peril
March 15, 2008 04:02 AM
Usher, 10,000 BC, and your company's confidential spreadsheets could all be out there for the world to grab. Here's how these data leaks happen and what you can do toPCI And The Circle Of Blame
February 23, 2008 05:00 AM
Who's responsible for the security of credit card data? From retailers to auditors to card brands, the first order of business is self preservation--and that costs all of us.Review: Automated Code Scanners
April 13, 2007 04:00 AM
With our developer hats on, we tested three source-code analyzers, evaluating language and platform support, usability and customization. Find out which one stood out from the others -- thanksAnalysis: Automated Code Scanners
April 13, 2007 04:00 AM
Vendors claim that adopting source-code security analyzers will fortify your business and protect your precious data. But should they be your only line of defense, or will they simply lull1 | 2 | 3 | 4 | 5 | Next Page »










