Can Security's Human Side Stop Data Breaches?
As human error increasingly becomes the top reason for security breaches, behavior-based strategies are making their way into the workplace to supplement technology.
Laptop Stolen from McCain Campaign in Missouri
Republican campaigners in Missouri are beefing up security after a laptop containing "strategic information" was stolen from a campaign field office of presidential contender John McCain.
10 Steps to Loading Dock Security
Companies in all industries struggle to secure the loading dock, that sensitive spot where goods come in and go out. Follow these best practices and sleep better tonight.
New Laptop Bags May Speed TSA Checkpoints
Airport checkpoints have been a choke point for travelers with laptops. That's about to change, thanks to newly redesigned bags.
- T-Mobile Lost Disk With Data on 17M Clients
- Report: IT Security Hindering Innovation
- Loading Dock Risk Assessment Questions
- Getting the Word Out on Insecure Hot Spots
- Evidence of Massive Site Compromise Found
- Net Infrastructure at Risk Again
- iPhone Security Flaws
- Culture Plays Role in Offshoring
- Mistakes Security Pros Would Make Again
- More Headlines
- Change Topic
Data Protection
- Report: IT Security Hindering Innovation
- T-Mobile Lost Disk Containing Data on 17 Million Customers
- Can Security's Human Side Stop Data Breaches?
- Laptop Stolen from McCain Campaign in Missouri
- TSSCI: Apocalypse Not
- Researcher Finds Evidence of Massive Site Compromise
- Vendors Fixing Bug That Could Crash Internet Systems
- Security Researcher Reveals iPhone Design Flaws
- Dark Visitor: Bypassing the Great Firewall of China
- WS Meltdown Could Spur Risk Management Spending
Data Center Directions Virtual Conference
Attend this free, 100% online event exploring tools and techniques for making your data center deliver for today and tomorrow.
Maximizing Site Visitor Trust Using Extended Validation SSL
Now with Extended Validation (EV) SSL available from VeriSign, you can show your customers that they can trust your site. Learn about EV SSL benefits in the free VeriSign white paper.
What a Botnet Looks Like
Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings.
The Six Things to Know about Executive Protection
Protecting executives and upper management requires risk assessment, cost-benefit analysis and old-fashioned legwork.
The Rise of Anti-Forensics
New, easy to use antiforensic tools make all data suspect, threatening to render computer investigations cost-prohibitive and legally irrelevant.