Security

EXCLUSIVE INTERVIEW

Metallect CEO Guy Hoffman on Risk Management

For technology dependent companies, risk comes in many forms. While the traditional information security risks are often the first that spring to mind, businesses with extensive collections of software face additional risks, especially when those applications become numerous. Guy Hoffman, chief exec...

It can be a scary world out there. Phishers, hackers, crackers and the like are determined to wreak havoc on network security -- and a firm's Chief Information Officer is smack dab in the middle of it all. The CIO establishes and directs the strategic long-term goals, policies and procedures for an ...

Yahoo said Tuesday it would join forces with PC security firm Symantec to provide a co-branded Web security service, an offering that mirrors those from other Internet firms. The service will give Yahoo customers the option of buying a Web-delivered version of Symantec's Norton Internet Security sof...

A new survey conducted by Insight Advantage and sponsored by IT security company Workshare, based in San Francisco, shows that organizations are not doing enough to prevent IT data breaches and the loss of "sensitive" data. The survey is based on interviews with 359 executives responsible for securi...

E-mail marketers at Time saw a significant increase in the effectiveness of their campaigns when testing a delivery system that certifies the origin of electronic messages. The system, Goodmail, is designed to create a trusted class of bulk e-mail that won't be hampered by spam filters imposed by In...

A revamping of security standards is being prepared by the major payment card issuers and is expected to be announced within the next 60 days. "[MasterCard along] with other payment brands including American Express, Discover, JCB and Visa are currently considering potential, recommended updates to ...

Employees at all levels within the enterprise are privy to a wide range of sensitive and proprietary information, which holds a high risk of damage if handled inappropriately. Those same employees are highly reliant upon e-mail for the effective distribution of information. And yet, for most of the...

Although the Department of Veterans Affairs may be able to relax slightly now that the laptop containing sensitive information on millions of veterans and military personnel has been recovered, the incident highlights the role government plays in ensuring data security. "It is a hot political issue ...

Stung by the unprecedented number of identify thefts and data losses that have occurred in recent months across academia, the private sector and the government, a group comprised of representatives from each of these areas has formed the Center for Identity Management and Information Protection.

INDUSTRY INSIDER

Indian Call Center Agent Arrested for HSBC Thefts

Police in Bangalore, India, reported the arrest Tuesday night of the chief suspect in the theft of funds from a score of customers of HSBC bank in the UK. Nadeem Kashmiri is being charged in India with stealing customer data that was sent to Nadeem's accomplices in the UK. Nadeem's accomplices ass...

In the latest example of the tension between government efforts in the war on terror and the media, the Bush administration is condemning news outlets that revealed details of a program that used the Internet to scan bank records for evidence of terrorism financing. Speaking at the White House, Pres...

The Federal Trade Commission on Thursday became the latest agency to acknowledge that personal data had been placed at risk due to a lost laptop computer, part of a trend that underscores the wide range of threats facing consumers' personal information. The FTC said it would provide free credit moni...

The loss of personal data on an estimated 26.5 million U.S. military veterans, up to 2.2 million current service members and an unquantified number of spouses continues to generate public controversy. It also provides lessons for how the private sector could prevent and respond to the loss of perso...

Disaster recovery planning is becoming a core part of business. Yet even when companies prepare for the worst, unexpected circumstances are bound to occur when a disaster actually hits. After such an incident, companies must shift modes -- from bracing for the calamity to planning for business conti...

Even with a steady stream of database breaches that lead to potential identity theft making headlines nearly every day, e-commerce continues to grow steadily, with many consumers increasingly sanguine about turning over sensitive information such as their credit card numbers to online merchants. St...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

E-Commerce Times Channels