Security

A federal grand jury has indicted four owners and key employees of a company that prosecutors said for years illegally cornered the market on the best concert and sporting event seats. The 60-page indictment accuses the men of directing an international conspiracy to defeat security schemes at Ticke...

Once again, Americans are hearing that the United States is a cybersecurity wimp, vulnerable to major damage should it ever suffer a large, organized cyberattack. The latest testimony underscoring that notion came from Michael McConnell, the former director of national intelligence, who spoke to the...

A freelance security consultant working on behalf of the Chinese government was likely involved in the hack attacks that prompted Google to take a stand against China last month, the Financial Times reported on Sunday. The man, who is in his 30s, did not launch the attack; rather, he wrote the code ...

Two Monday technology stories, both involving China: Call them the yin and yang of that country's attempts to repair its image following Google's recent hacking allegations and the search giant's subsequent threats to end its business dealings in the country. Chinese police are trumpeting their shut...

ANALYSIS

IBM Taps Power of DAM With Guardium Buy

In November 2009, IBM announced its acquisition of Guardium, a privately held company based in Waltham, Mass., and the planned integration of Guardium's Database Activity Monitoring technology into IBM's Information Management and Business Analytics and Optimization initiatives. Financial terms were...

As the U.S. federal government moves ahead with its cloud computing strategy, it may find that the real bugbear won't be technology but politics. What else would expect on the Hill? Other problems could pop up in the government's approach to security and a lack of adequately qualified staff. Can the...

Regardless of the state of the economy, information security remains a top concern for consumers worked up about their information, for businesses seeking to protect that information, and for job-seekers looking for the next big thing. Even during the recession, the demand for information security-...

American companies need to take a stand against censorship on the Internet, Secretary of State Hillary Rodham Clinton said on Thursday in a speech on Internet freedom delivered at the Newseum in Washington, D.C. "Censorship should not be in any way accepted by any company from anywhere," Clinton sai...

EXPERT ADVICE

End-to-End Encryption: Beyond PCI Compliance

The Payment Card Industry Data Security Standard has undoubtedly made a significant improvement to the security of cardholder account numbers and other sensitive information within the payment card infrastructure. The standard lays out a strong set of requirements that merchants, acquirers and proce...

2009 was the first year since 2005 that the number of data breach incidents recorded actually dropped. If that makes you feel a little more secure -- there is a counter side. The same site reports on personal records that have been exposed: 220 million records in 2009 as compared with 35 million i...

As the number, power and flexibility of mobile devices has increased, so has their use for shopping. In 2008, a Nielsen survey found that 9 million people in the United States "have used their mobile phone to pay for goods or services," and many more expect to do so soon. In a 2009 survey by Deloitt...

In this age of phishing, hacking, identity fraud, and other forms of cybercrime, answering two simple questions -- "Who are you?" and "How can you prove it?" -- is fast becoming a critical requirement for all online business activities. Moreover, solving this "identity management" challenge has beco...

Hope was a slogan and a sentiment that played a major role in the U.S. presidential election of 2008, and hope continues to be the mindset of technology advocates pushing for cloud computing in the public sector. As a former government employee with a long history in the intelligence field, I can ea...

When stumbling around the Web in search of a new toaster or a great deal on a new pair of sneakers, it's not unusual for consumers to come across ominous policy dialogs warning of mismatched or expired SSL certificates. In fact, recent surveys have shown nearly 20 percent, or even more, of popular W...

Less than 20 days until Cyber Monday. You've got staffing queued up. Your warehouse is full. Your shipper is standing by. But have you considered what will happen on your Web site after a flood of qualified buyers click on the irresistible and precisely worded ad for your product or service? You've ...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

E-Commerce Times Channels