Articles
Personal, proprietary and payment card data is being routinely compromised to the tune of a Ponemon Institute estimated US$ 194 per lost record and average total breach cost of US$ 5.5 million by loss leading United States-based organizations.
Continue reading...
Commonly used as graphical representations of text in registration or comment areas, CAPTCHAs require a user to prove their human qualities by reading a distorted set of characters and enter them into a form.
Continue reading...
The last time we spoke about Watchdox, we told you about the many ways that you can track and control your documents when sharing. This week, Confidela, the maker of WatchDox unveiled a new iPhone and iPad application developed to ensure safe document sharing on potentially insecure mobile platforms.
Continue reading...
While living in the cloud has become a popular option, companies remain skeptical. No matter how many security precautions are provided, when services like SaaS, IaaS (Infrastructure as a Service) and PaaS (Platform as a Service) are offered in the cloud, companies are tentative to employ them. Game. Set. Match.
Continue reading...
Following IBM’s release of new tax compliance software, Autonomy has licensed its IDOL technology to the IRS to keep track of companies’ tax liabilities. While it might be difficult to secure Federal IT contracts now, it could be about to get a lot harder.
Continue reading...
A new survey tells us the value of your company's secrets. In other news, iPads are slowly coming to healthcare IT. The Value of Corporate Secrets A survey of 305 IT leaders from around the world, conducted by Forrester Consulting on behalf of Microsoft and RSA, the Security Division of
Continue reading...
PCI (Payment Card Industry) compliance standards protect personal information and ensure security when transactions are processed using a payment card. Thanks to ClearPoint Metrics new PCI compliance management solution, organizations can manage PCI compliance risk more effectively, and reduce the cost of auditing and reporting.
Continue reading...
This week in GRC delivers data security tips, options for storing data off the grid and an executive shift in priorities. Protect Your Data, Save Millions There’s no doubt that breakdowns in data security can cost companies money. The Ponemon Institute, an organization dedicated to privacy, data protection and
Continue reading...
Email security is at the top of every company's To Do list. Spam and malicious email continues to wreak havoc globally. The economic recession isn't helping matters any and as a result more end-users are prone to falling victim to financial fraud.
Continue reading...
Many of today's corporate environments are embracing enterprise CMS solutions as a way to disseminate and share information amongst workers and workgroups. Microsoft SharePoint is a popular choice because it aligns well with an existing Microsoft-powered network and project groups’ workflow.
Continue reading...