data privacy - News, Features, and Slideshows

News about data privacy
Features about data privacy
  • Privacy is the new killer app

    A funny thing is happening in the wake of the <a href="http://www.computerworld.com/article/2490179/security0/security0-the-snowden-leaks-a-timeline.html">Edward Snowden NSA revelations</a>, the infamous <a href="http://www.computerworld.com/article/2601905/apple-icloud-take-reputation-hits-after-photo-scandal.html">iCloud hack of celebrity nude photos</a>, and the hit parade of customer data breaches at <a href="http://www.computerworld.com/article/2490637/security0/target-finally-gets-its-first-ciso.html">Target</a>, <a href="http://www.computerworld.com/article/2844491/home-depot-attackers-broke-in-using-a-vendors-stolen-credentials.html">Home Depot</a> and the <a href="http://www.computerworld.com/article/2845621/government/us-postal-service-suffers-breach-of-employee-customer-data.html">U.S. Postal Service</a>. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.

    Written by Matt Weinberger15 Nov. 14 02:37
  • New privacy laws: Have you done enough?

    New laws have significantly enhanced the privacy of Australian citizens but many CIOs are still not aware of the implications.

    Written by Brad Howarth03 April 14 08:48
  • How Facebook and Twitter are changing data privacy rules

    CIOs think about <a href="http://www.cio.com/article/32306/Privacy_Is_Your_Business">privacy</a> the way some people think about exercise: with a sigh and a sense of impending pain. Outside of regulated industries like health care--where patient privacy is paramount--privacy affects CIOs as a corollary of security when, say, a laptop holding millions of people's records is lost or hackers siphon off customer data.

    Written by Michael Fitzgerald12 June 09 07:36

Whitepapers about data privacy

  • Detect, defend against and recover from insider attacks

    Accept that sooner or later you’re going to have someone prowling around your network looking to cause damage or steal your critical data. Even the best perimeter defenses can do nothing to stop them, so it's essential to also have strong Active Directory security and governance in place. Here is a how to on combating the insider threat effectively.

[]