Similar Articles |
|
InternetNews July 13, 2009 |
Report: 85 Percent of U.S. Businesses Breached A new report has a recommendation for organizations that fear a breach and the reporting requirements that go with it. |
Bank Systems & Technology December 14, 2005 Ivan Schneider |
Cheating on the ID Challenge Here is how this consumer received his free, annual credit reports from Equifax, Experian and TransUnion -- and how he found the need for an identity cheat sheet along the way. |
Information Today March 2006 Phillip Britt |
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. |
InternetNews July 9, 2009 Alex Goldman |
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. |
CIO October 1, 2003 Lorraine Cosgrove Ware |
By the Numbers It's not just what you send, it's what you store that needs encryption. |
Entrepreneur June 2007 Amanda C. Kooser |
Safety First Keep your customer and employee data on lock-down. |
The Motley Fool March 29, 2006 Rich Smith |
Equifax Gets Some Competition Credit-checker Experian is currently part of the U.K.-based retail and financial services conglomerate GU.S. Plc. GUS has decided to split itself in two sometime within the next year, spinning off Experian as one independent public company, and Argos Retail as another. Investors, take note. |
InternetNews February 2, 2007 Roy Mark |
Congress, White House Dinged on Cyber Security Lawmakers' inability to pass legislation and the administration's lack of leadership earn D's in annual report card from CSIA. |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. |
InternetNews February 20, 2009 Jennifer Schiff |
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. |
InternetNews November 17, 2010 |
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. |
Wall Street & Technology October 23, 2007 Melanie Rodier |
How Are U.S. Businesses and Lawmakers Responding to Data Breaches? Nearly 77 million individuals have been affected by data breaches so far this year. But even after suffering a data breach, many businesses failed to implement encryption solutions or seek legal counsel. |
PC World December 7, 2007 Becky Waring |
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. |
Information Today May 16, 2011 |
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. |
The Motley Fool January 20, 2005 Dayana Yochim |
Who Has the Keys to Your Credit File? Anyone with a "permissible purpose" can peruse your credit history. Do your own sleuthing and see who has been inquiring about your credit history. |
InternetNews February 9, 2007 Roy Mark |
When Is a Breach a Breach? If you think there's hope for a national data breach notification law, consider this: Congress can't decide what a breach is. Really. |
Wall Street & Technology June 18, 2007 Melanie Rodier |
US Businesses Still Lack Adequate Security to Protect Client Information Study shows 85% of midsize to large businesses spanning all industries reported data security breach, mostly due to stolen equipment. |
InternetNews September 21, 2010 |
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. |
PC World September 2003 Lincoln Spector |
.Zip File Format Splinters Top compression utilities may not read each other's files. |
InternetNews March 12, 2007 Andy Patrizio |
Seagate Delivers Encrypting Hard Drive Seagate on Monday announced a partnership with ASI Computer Technologies to deliver laptops with encrypted hard drives. The advantage of these drives is if the notebook is lost or stolen, the data on the drive is inaccessible. |
Wall Street & Technology January 5, 2007 Patricia Brown |
Equifax's Big Spend on Security Aside from assigning credit scores for individuals, another core part of Equifax's business is to keep sensitive information secure. |
PC World July 9, 2002 Lincoln Spector |
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. |
Entrepreneur November 2004 Amanda C. Kooser |
The I's Have It A more secure wireless standard is on its way and major manufacturers are expected to implement the new standard with a focus on business hardware first. |
The Motley Fool June 30, 2007 Elizabeth Brokamp |
Monitor Your Own Credit Don't want pay a credit monitoring service? Do it yourself. To obtain a free copy of your credit report, you have three options. |
Fast Company Pavithra Mohan |
Hackers Compromise T-Mobile Customer Data, Steal 15 Million Records In the past year, a staggering number of high-profile hacks have been carried out against various companies and organizations, including a large-scale attack that leaked the personal information of 22 million government employees. |
Bank Systems & Technology June 30, 2009 Nathan Conz |
Heartland Completes First Phase of Encryption Pilot Heartland Payment Systems announces it has successfully completed an AES-encrypted transaction process from a merchant card reader through to a processor network. |
InternetNews September 12, 2006 Sean Michael Kerner |
IBM Encrypts The Key to Privacy IBM today officially announced new encryption technology and services that claim to provide "end-to-end" protection of customer data stored on IBM tape drives. |
Entrepreneur September 2008 Heather Clancy |
Unscramble This Encrypting data can save you lots of heartache. how should you do it? |
CRM March 2, 2012 Raul Ortega |
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. |
InternetNews December 13, 2004 Sean Michael Kerner |
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. |
CIO July 15, 2001 Fred Hapgood |
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... |
InternetNews November 9, 2005 Paul Shread |
Storage Security Market Heats Up The storage security market has been heating up as of late, spurred by high-profile data breaches and growing congressional interest in the issue. |
InternetNews August 27, 2009 |
First WEP, Now WPA Encryption Falls Japanese researchers to show how WPA can be broken as easily as WEP, in under a minute. |
The Motley Fool August 30, 2005 Dayana Yochim |
Your Credit Score's All Wrong The author reveals the kinks in the consumer credit scoring system and explains why the credit file you're allowed to see isn't the same one your banker uses. |
The Motley Fool June 13, 2006 Tim Beyers |
ID Theft: When Will It End? This time, the Energy Department blows it. So what should have happened? Here's what to do if you think your ID has been compromised. |
National Defense August 2013 Jeffrey G. Richardson |
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. |
PC Magazine April 30, 2009 Nicole Price Fasig |
Give Your Data a Safe Trip These secure hard drives will keep your files from falling into the wrong hands on the road. |
The Motley Fool June 20, 2006 Dayana Yochim |
Fake Credit Scores for Sale You might be surprised how label-conscious your lender really is. No matter what the scoring scale, all of these systems are designed to achieve one goal -- to see how risky it is to do business with you based on your past behavior. |
BusinessWeek November 19, 2007 Stephen H. Wildstrom |
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. |
InternetNews June 1, 2009 Alex Goldman |
What Enterprises Can Learn from the RAF Breach The latest security snafu from across the pond provides lessons both on what not to do with sensitive data and what you should do after things go wrong. |
Entrepreneur September 2005 Scott Bernard Nelson |
Reporting In Federal law now allows you to check your credit reports for free every year. Here's how to access them -- and protect your credit rating. |
CIO October 12, 2009 Kim S. Nash |
Cloud Computing: How TransUnion Makes Money from Its Private Cloud Credit reporting giant TransUnion replaced custom-developed services with cloud computer capabilities for its customers. |
Bank Systems & Technology June 26, 2006 Gregg Keizer |
Cleanup Costs Much More Than Encryption: Gartner Protecting customer records is much less expensive than paying for cleanup after a data breach or massive records loss, according to Stamford, Conn.-based Gartner. |
InternetNews September 24, 2008 Paul Shread |
Can Storage Fabrics Offer Security? Security is becoming an increasingly important part of storage fabrics, judging by recent announcements from Cisco and Brocade. |
InternetNews April 4, 2008 Judy Mottl |
HP Targets Storage With New Security Tools HP expands Secure Advantage Portfolio with new tools and free service. |
PC Magazine August 31, 2005 Ryan Naraine |
Privacy pioneer promises secure VoIP Phil Zimmermann, the celebrated cryptographer who created PGP (Pretty Good Privacy) for e-mail encryption, is taking a shot at securing VoIP communications. |
CIO May 15, 2012 Kim S. Nash |
Experian Has Sophisticated Presence on Facebook Credit bureau engages chatty customers on the top social network, but says it doesn't mine the data for marketing purposes. |
Bank Technology News September 2009 Rebecca Sausner |
1) Heartland Payment Systems Heartland Payment System's E3, an end-to-(almost) end encryption process, has the greatest potential of any new product to impact the security of America's financial system in the coming year. |
PC Magazine August 22, 2008 Matthew D. Sarrel |
Thwarting Identity Theft Identity theft has been a federal offense since 1998. But are we getting any better at dealing with it? Actually, we are. Here are several tips to prevent financial loss from identity theft. |
InternetNews June 11, 2010 |
Feds Reassessing Breach Notification Laws Data breaches small and large continue to plague consumers and businesses at a record pace and lawmakers at all levels of government are now considering more proactive legislation to help thwart identity theft. |