Blog Posts Tagged with "Data Protection"

3e35900ae6facc6c146a85c435c71d82

Public Key Infrastructure 1998 – 2012

March 25, 2012 Added by:Ben Rothke

PKI was and still is a powerful set of technologies. But it was a solution far ahead of its time. It was doomed by a lack of standards, interoperability issues, deployment complexities, and a level of complication that confounded even technologically competent end-users...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Data Back-Up Strategies for Your Business

March 25, 2012 Added by:Robert Siciliano

Do you backup data? One of the problems with getting a small businesses to secure data is they think they need to load up thumbdrives, DVDs or tape devices manually. This is in fact tedious and overwhelming. I’ve got news for you, data backup is easy...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Transborder Data Flows at Risk

March 22, 2012 Added by:David Navetta

The proliferation of comprehensive data privacy laws, more or less on the European model, increasingly requires US-based multinationals and online companies to adapt to strict requirements for dealing with individuals in other countries...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Reflections on a Past Vulnerability, Kind Of...

March 22, 2012 Added by:Brent Huston

I don’t want to dig into the debate about open disclosure and non-disclosure. You may have different opinions about it than I do, and I am perfectly fine with that. I choose this path in vulnerability handling because it makes the world a safer place for all of us...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Need for Advancements in Browser Based Security

March 08, 2012 Added by:Headlines

"Data protection is fast becoming a product and service differentiator. It is incumbent on business leaders to take a holistic view of these issues and understand how they are undermining consumer trust. Now is the time for businesses to make data protection a priority..."

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

The Security Impact of Putting it in the Cloud

February 19, 2012 Added by:Robb Reck

nd. Information security must not be the roadblock that prevents the adoption of such technology. By thinking ahead about the kinds of risks that outsourcing our systems will involve, we can be ready to quickly and securely lead our organization into the cloud...

Comments  (3)

A88973e7d0943d295c99820ab9aeed27

Data at Rest: Dormant But Dangerous

February 10, 2012 Added by:Simon Heron

Data is considered to be either ‘at rest’, ‘in transit’ or ‘in use.’ When putting security measures in place, it is important to consider all three states and address risks associated with each. This article examines data at rest and proposes strategies to minimize dangers...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Tips for Organizations Heading to the Cloud

February 09, 2012 Added by:Ben Kepes

Identify the data that is touched by each IT process. Is there any data that has to stay in-house for security or compliance reasons? You may need to change IT processes so the sensitive data is not affected by the transition...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Encryption: On Hashing Basics

February 08, 2012 Added by:PCI Guru

Never store the obscured value along with the truncated value. Always separate the two values and also implement security on the obscured value so that people cannot readily get the obscured value and the truncated value together without oversight and management approval...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Insecurity by Way of Compliance

February 08, 2012 Added by:Danny Lieberman

The US leads in data security breaches while the EU leads in data security. The EU has strong, uniform data security regulation, whereas the US has a quilt-work of hundreds of security directives where each agency has it’s own system for data security compliance...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Loss Prevention Step 6: Encrypting Data at Rest

February 06, 2012 Added by:Rafal Los

Even if you did know where all your critical information is, you'd probably be powerless to control its sprawl. Let's face it, systems consume data and then become mobile - which is hardly something you can do anything about in a world where mobility is a key business driver...

Comments  (3)

37d5f81e2277051bc17116221040d51c

How to Encrypt Your Email with PGP

February 06, 2012 Added by:Robert Siciliano

Pretty Good Privacy (PGP) “is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Disappointing Ruling in Compelled Laptop Decryption Case

February 01, 2012 Added by:Electronic Frontier Foundation

A federal district court has handed down an unfortunate early ruling in a case. Prosecutors asked the court to force the defendant to either type an encryption passphrase into the laptop to decrypt the information or turn over a decrypted version of the data...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Legal Implications of Social Networking Part 3: Data Security

January 31, 2012 Added by:David Navetta

Technology exists for monitoring and tracking of social media usage by employees. Ultimately however, like social media itself, it comes down to people - risk can only be addressed appropriately if the individuals using social media are equipped to identify and mitigate against it...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Software Vendor Access to Customer Data

January 30, 2012 Added by:Ben Kepes

The issue is a massive one for the industry and in a back-channel discussions a number of people made comments regarding how much of a risk to the cloud industry service provider access to data is. One person went on to say that this perception is poison to sales growth...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

The Emerging Threat to Public-Key Encryption

January 26, 2012 Added by:Alan Woodward

We are now entering a new era where we have programmable, relatively inexpensive, small, quantum computers visible on the horizon, and we know that such computers have the potential to undermine the mathematics upon which current public-key encryption depends...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »