Blog Posts Tagged with "Security"

5e402abc3fedaf8927900f014ccc031f

Five Concerns Surrounding Pinterest

May 10, 2012 Added by:Allan Pratt, MBA

At the current time, there are no privacy or security settings similar to Facebook or Google Plus, and boards cannot be made private, similar to customized Facebook lists or customized Google Plus circles. The bottom line is that anyone with Internet access can view your boards...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Busting the Ten Biggest Computer Security Myths

May 08, 2012 Added by:Headlines

While some of the myths addressed may seem to be common sense issues, they also represent widespread misconceptions that continue to be pervasive in the information technology world today, so a reminder that these notions are bunk seems in order...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Patchwork Cloud: Making the Security Case

May 05, 2012 Added by:Rafal Los

When we think about cloud computing we can think of security as getting a bit of a gentle push, or shove in some cases. The way it is built and billed as services instead of individual components, and the increased emphasis on automation - security has a real chance of not being a roadblock...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Healthcare Data: I Trust You to Keep this Private

May 03, 2012 Added by:Danny Lieberman

In this article, Danny Lieberman talks about the roles that trust, security and privacy play in online healthcare interactions. At the end of the article, he introduces the idea of private social networking for healthcare – leaving the piece open for a sequel...

Comments  (2)

D13f77e036666dbd8f93bf5895f47703

When Security and Privacy Wrestle Who is the Winner?

April 30, 2012 Added by:Theresa Payton

You need to make sure your voice is heard. Regardless of whether or not you love the idea or do not like the idea at all, you need to weigh in. It is an important part of the process to make sure we get the best chance and striking a balance between security and privacy...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Good Security Starts at Home

April 23, 2012 Added by:Ben Rothke

Not a day goes by without yet another spate of privacy and security issues. Threats to the security, privacy and personal information continue to increase in scope and complexity. To maintain competitive edge, vendors and service providers are scrambling to keep up...

Comments  (17)

91648658a3e987ddb81913b06dbdc57a

Projectile Dysfunction

April 13, 2012 Added by:Ron Baklarz

Was it me or when they showed the North Korean Space Control Center did it not look like a group of students at a code fest? Seriously, there were no large screens for tracking and I’ve seen more computing power at the local senior citizens home...

Comments  (2)

Bd623fa766512fdf6b57db66f522b741

A Navy SEAL Provides Lessons on Security

April 12, 2012 Added by:Ali-Reza Anghaie

Powerful Peace absolutely applies in our field. Information Security professionals can draw out the roadmap to economic and potential physical catastrophe. In this field we won't have the benefit of hindsight, we need to get it right before it gets out of control...

Comments  (0)

3d59aecdf4b868d6359fd27d7b776105

Security Leaders Give Up

April 12, 2012 Added by:T.H. Enders

Breaking News: In uncanny synchronicity, CISOs, CSOs, auditors, and security consultants up and walked off their jobs today. It's hard to say what the repercussions will be. Pundits, analysts, and DHS are still trying to get a clear picture of the breadth of the problem...

Comments  (7)

E313765e3bec84b2852c1c758f7244b6

Credit Unions and Small Banks Need Strong Security Relationships

April 05, 2012 Added by:Brent Huston

Smaller organizations need to leverage simple, effective and scalable solutions to achieve success. They simply won’t have the manpower to manage overwhelming alerts, too many log entries or some of the other basic mechanisms of infosec...

Comments  (0)

1789975b05c7c71e14278df690cabf26

Mind Control Security Awareness

April 03, 2012 Added by:Pete Herzog

ISECOM's SmarterSaferBetter seminar teaches you to actively keep on re-filtering. Doing it right by being alerted to prompts is the best way to keep your guard up, because actively filtering your world is truly exhausting. And being tired is when we make security mistakes...

Comments  (4)

7fef78c47060974e0b8392e305f0daf0

Authorities Apprehend the Hacktivist Known as th3j35t3r

March 31, 2012 Added by:Infosec Island Admin

In a shocking turn of events, the hacktivist known as th3j35t3r has been identified as Robert "Lance" Miller from Pittsboro, North Carolina. Mr Miller is now in police custody after the multi-agency operation took place in the early hours of the morning on April 1st, 2012...

Comments  (8)

69dafe8b58066478aea48f3d0f384820

Experts Warn of Online Voting Security Issues

March 30, 2012 Added by:Headlines

“Election officials who run and pursue online voting programs must understand that they are putting voters’ ballots at risk of being altered or deleted without anyone realizing it,” said Susannah Goodman of the Election Verification Network...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Protect Yourself from Vishing Scams

March 30, 2012 Added by:Robert Siciliano

Vishing occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

IP Address Leads Police to Shootout with French Terrorist

March 24, 2012 Added by:Dan Dieterle

Elite French special operation RAID Police took down the radical Muslim terrorist Mohamed Merah on Thursday. Merah had contacted one of his victims, a French soldier, on the pretext of buying his scooter. Investigators were able to match Merah to his IP address...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Social Media Security Basics: An Infographic

March 22, 2012 Added by:Fergal Glynn

Social networking has quickly become a major medium for communications for both individuals and organizations, but the platforms that allow the development of online personae are not without their own inherent risks. These social media security basics everyone should embrace...

Comments  (1)

Page « < 3 - 4 - 5 - 6 - 7 > »