Blog Posts Tagged with "Data Protection"

37d5f81e2277051bc17116221040d51c

How to Encrypt Your Email with PGP

February 06, 2012 Added by:Robert Siciliano

Pretty Good Privacy (PGP) “is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Disappointing Ruling in Compelled Laptop Decryption Case

February 01, 2012 Added by:Electronic Frontier Foundation

A federal district court has handed down an unfortunate early ruling in a case. Prosecutors asked the court to force the defendant to either type an encryption passphrase into the laptop to decrypt the information or turn over a decrypted version of the data...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Legal Implications of Social Networking Part 3: Data Security

January 31, 2012 Added by:David Navetta

Technology exists for monitoring and tracking of social media usage by employees. Ultimately however, like social media itself, it comes down to people - risk can only be addressed appropriately if the individuals using social media are equipped to identify and mitigate against it...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Software Vendor Access to Customer Data

January 30, 2012 Added by:Ben Kepes

The issue is a massive one for the industry and in a back-channel discussions a number of people made comments regarding how much of a risk to the cloud industry service provider access to data is. One person went on to say that this perception is poison to sales growth...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

The Emerging Threat to Public-Key Encryption

January 26, 2012 Added by:Alan Woodward

We are now entering a new era where we have programmable, relatively inexpensive, small, quantum computers visible on the horizon, and we know that such computers have the potential to undermine the mathematics upon which current public-key encryption depends...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Five Ways to Revamp Your Home-Based Business Security

January 26, 2012 Added by:Kelly Colgan

No matter how small your operation, or even if you only occasionally work from home, clients trust you to protect their data — and laws in 46 states requires that you do so. Businesses must notify clients whose information is compromised, and notification can be costly...

Comments  (2)

Fc152e73692bc3c934d248f639d9e963

Encryption Basics: It's Not a Mystical Science

January 25, 2012 Added by:PCI Guru

Regardless of the algorithm used, they are not perfect. Over time, encryption algorithms are likely to be shown to have flaws or be breakable. Some flaws may be annoyances that you can work around or you may have to accept some minimal risk of their continued use...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook to Live Stream International Data Privacy Day Event

January 25, 2012 Added by:Headlines

Data Privacy Day is an international initiative that commemorates the signing of Convention 108, the first international treaty dealing with privacy, security and data protection, which recognizes the right to protection of personal information as a fundamental freedom...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

OTA: 2012 Data Protection and Breach Readiness Guide

January 24, 2012 Added by:Headlines

In 2011, over 558 incidents were reported at a cost to U.S. businesses of more than $6.5 billion dollars. It is estimated over 50% were a result of a server exploits; of which 96% were avoidable if the recommendations outlined in the OTA report had been implemented...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Can You Explain Encryption to Me?

January 23, 2012 Added by:Javvad Malik

I assumed that senior technology managers would have half a clue about technology. I have thought long and hard about this and think the easiest way to explain this would be to replace the word encryption with witchcraft. It too is misunderstood by the masses...

Comments  (4)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Loss Prevention - Step 1: Know What's Important

December 12, 2011 Added by:Rafal Los

It's important to understand what your company does and then figure out what the critical bits are. Sometimes it's your customer lists, or a secret ultra-high efficiency engine design, or the next big thing in stealth bombers. The point is that you simply need to know your business...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Look Around...The FTC is Really Busy

October 17, 2011 Added by:David Navetta

One of the most important elements in this publication is the FTC’s statement that all of the laws applicable to consumer protection offline apply online too. The FTC advised that we should use the same factors we use to determine if a disclosure is conspicuous...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Blumenthal Bill Bumps Up Fines for Security Breaches

September 18, 2011 Added by:David Navetta

Richard Blumenthal (D-CT) introduced bill that would levy significant penalties for identify theft and other “violations of data privacy and security,” criminalize software that collects “sensitive personally identifiable information” without clear and conspicuous notice and consent...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senator Seeks Punitive Model for Data Security Laws

September 14, 2011 Added by:Headlines

The devil is in the details with these laws. But there are a number of questions here... These companies are already victims in these attacks, so why are we penalizing them after a breach? I think that's because it's easier to issue fines than it is to track down the criminals and go after them..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Hybrid Delivery: Corporate Applications and the Cloud

August 13, 2011 Added by:Rafal Los

As applications start to cross network boundaries between the traditional corporate network and cloud-based providers and service vendors, there is an imminent collision between the application development practices of yore, and the differing requirements around architecting for the cloud...

Comments  (1)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Russia Amends Federal Data Protection Law

July 20, 2011 Added by:David Navetta

In the past, some of the strict foreign data protection laws have not been rigorously enforced, giving businesses breathing room. The enforcement landscape is likely to tighten in the near future, however, increasing the risk of investigations and sanctions for privacy violations...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »