There is no shortage of advice on how to secure information. While much of this advice is good and would result in a more secure environment, there are lots of other things that go into an effective security program. Robert E. Braun and Michael A. Gold identify seven chief destroyers
Security experts at Unisys Corp. predict that 2014 will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data traffic inside enterprises is vulnerable to detection from outsiders. More>>
Every year since 1988, Computer Security Day has asked us to take a look at how we protect our data online. But messing with other people¡¯s information goes back a long way before that¡ªa long way before computers, in fact. What¡¯s regarded as the first hack actually happened 110 years
As more employees carry their own computing devices to work, companies are turning to technology startups that provide data security and authentication services to prevent theft and misuse of corporate information. More>>
As information security breaches continue to make headlines and remind everyone of the dangers of an unprotected network, one might think that IT security is a top priority for business executives across the board. Not so, according to one security expert who believes that existing security measures are woefully outdated.
Thirty-one per cent of respondents in Ernst & Young's (EY) 16th annual 2013 global information security survey say that the number of security incidents within their organisation has increased by at least 5 per cent over the past 12 months. More>>