People and organizations dispose of their computers including the Hard drives when no more needed or considering that...
Building an Information Security Plan
Building a comprehensive Information Security plan requires a detailed understanding of the business and the related...
CIOs more concerned than ever about social media and data loss
Survey finds security breaches due to social networking more pressing than everA new survey from email security firm...
Typical data leakage scenario.s
Data leakage is a key threat which could give sleepless nights for any business executive and is definitely on the top...
Drive-By Pharming
Sid Stamm, Zulfikar Ramzan, and Markus Jakobsson have identified a clever, and potentially devastating, attack against...
VeriSign laptop theft
A laptop containing the personal information of VeriSign.s current and former employees was stolen from an employee.s...