Quantcast
Channel: The Business-Technology Weave » data breach
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

Security Postures: Time to start pedaling faster

  Back in my misspent youth, us kids used to ride our bikes as fast as we possibly could, trying to leave group members behind.  The slowpokes invariably whined… “Hey!”… “Wait up!”… and if we could...

View Article



Image may be NSFW.
Clik here to view.

Massachusetts and Breach: Yielding a Comprehensive Understanding of Risk

According to the Massachusetts state attorney general’s office, approximately 2 million residents have had their personal information compromised just in the past 20 months.  Electronic data breaches,...

View Article

Image may be NSFW.
Clik here to view.

Security Expert Eugene Kaspersky Warns of Cyber-Terror

  Today, any organization is dead without its technical supports.  Even an attack on content – information, business intelligence, data – can put business at risk.    By “business,” we mean the doing...

View Article

Image may be NSFW.
Clik here to view.

Cyber-terror, Hacktivism, etc.: New thoughts on security for the modern...

  The Washington Post is reporting that foreign hackers disabled a pump at an Illinois water plant last week, according to the preliminary state report.   If the source of the attack is confirmed as...

View Article

Image may be NSFW.
Clik here to view.

Cyber Crime to Invade Public Cloud… and more…

  Well, I guess it already has.  But an interesting opinion was rendered recently regarding the United States’ position regarding cyber crime.  According to Trend Micro’s global CTO, Raimund Genes,...

View Article


Image may be NSFW.
Clik here to view.

PC Magazine’s “The 25 Worst Passwords of 2011”

  We’ve discussed password liabilities before:  Consider that many people use the same password (and often User ID) for multiple accounts.  This can include online bank credentials, work accounts,...

View Article

Image may be NSFW.
Clik here to view.

Leveraging Knowledge Requires… Knowledge

Leaders must have the skill to recognize skills in others.    The IT field, like any, is rife with people who talk a good game.  Some walk like they talk – some don’t.  The average candidate for your...

View Article

Hackers are Hitting Macs with a Major Virus

  Word comes that more than 500,000 Macintosh machines are potentially infected with a virus – one that is specifically targeting Macs:  It’s called Flashback Trojan.  The virus is a variation on one...

View Article


Image may be NSFW.
Clik here to view.

Crucial Considerations when Going Mobile, Pt. IV – Security

Security is of prime concern in the mobile environment. IT security in any realm involves logical security and physical security.  Logical security is the integrity of data (content), precision of...

View Article


Image may be NSFW.
Clik here to view.

94 MILLION Personal Files Exposed: Sobering Statistics Regarding Data Breach

According to security firm Rapid 7, approximately 94 million personal files of Americans have been exposed by government agencies since 2009 – those that we know about, that is. There are likely even...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images