THE SCENE OF THE CRIME DATELINE: Your Town, USA. It was a dark and stormy night and a crime was being committed: the felonious theft of precious goods for material gain. The victim was an organization engaged in a variety of businesses including computer database...
Although information security and cyber-risk management is recognized as an enterprise-wide responsibility by many organizations, the information technology (IT) department still is seen as the front-line defense against information losses and other cyber-liability...
Last week’s revelations that one, and possible multiple, Certificate Authorities (CA) had been breached really rocks the basic foundation of information security as we know it. When you couple this news with the RSA breaches reported earlier this year, there are...
No one likes tossing out cookies, but privacy gurus say clearing them off your hard drive is one of the best ways to 0diggsdigg protect your ID from falling into the hands of online thieves. But if Adobe Systems has anything to do about it, keeping your...
The whole social networking phenomenon has millions of Americans sharing their photos, favorite songs and details about their class reunions on Facebook, MySpace, Twitter and dozens of similar sites. But there are a handful of personal details that you should never...