data protection - News, Features, and Slideshows
data protection in pictures
The U.S. National Security Agency is planning no major changes in its domestic telephone records collection program after a bill to rein in those efforts failed in the Senate this week, the agency's director said.
By Grant Gross | 21 November, 2014 04:40
BitTorrent dismissed claims that its popular peer-to-peer file synchronization program BitTorrent Sync has an insecure cryptographic implementation that potentially gives the company access to users' files.
By Lucian Constantin | 20 November, 2014 02:38
It's OK to be paranoid about every last detail when it comes to security.
By Networkworld Staff | 19 November, 2014 08:31
Swedes have started to sign up for a free service from ISP Bahnhof to hide their Internet communications metadata from the police, and the company's CEO is urging other European ISPs to follow suit.
By Loek Essers | 19 November, 2014 03:22
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.
By Jaikumar Vijayan | 16 August, 2014 20:49
That someone had to take the fall for the massive breach at Target is neither surprising nor unexpected. The only question is whether more heads will roll in the aftermath of one the biggest data compromises in retail history.
By Jaikumar Vijayan | 05 March, 2014 21:27
Whitepapers about data protection
This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTAcquisition Marketing ExceutiveNSW
- FTStudio Design ManagerVIC
- FTProgram Manager - Integration & SolutionsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTSenior SEO ManagerNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTStudio Design ManagerVIC
- FTChief Information Officer - CSIROACT
Pekin Insurance, a large Midwestern insurance policy provider with 1,200 agencies and 7,500 independent agents, is always striving to better serve its customers. Pekin wanted to give its growing number of tech-savvy customers direct online access to policy and billing information. To do that, Pekin launched a new web application, called My PI that would deliver a self-service customer portal.
- NXP opens wallet to build wearables with better battery life
- Senate backs Ludlam on data retention costs
- Merchants welcome Square to Australia
- Report: Samsung's head of TVs may be asked to revitalize mobile business
- Webcam snooper now looking for a job
- Telstra targets government with secure cloud offer
- Australia, Canada, UK and China weigh in on Insecam privacy issue
- Traces of Regin malware may date back to 2006
- Analyst, Vodafone cast doubt on likelihood of telco's sale
- Symantec identifies sophisticated, stealthy 'Regin' malware
- Spliddit: Algorithms to divide the rent, stuff, or credit fairly between people
- Why is Microsoft updating Windows PCs for a security bug on the server?
- Prices for 4K monitors sink below $500
- Apple's $450 million e-books settlement gets final approval
- Black Friday: Newegg axes prices on laptops, desktops, tablets and more