You are here
Home > Posts tagged "Data Protection" (Page 3)

SQL Injection Attack

Blogs

No cyber criminal (that we know of) has stolen more credit cards than Albert Gonzalez. Originally indicted by a federal grand jury for breaking into T.J. Maxx’s credit card processing operations, Albert Gonzalez and his team are accused of criminally hacking some of the best-known companies in America including; Dave

Data protection practices in EU and Asia

Research undertaken by Field Fisher Waterhouse examines the legal obligation to encrypt personal data in both Europe – with particular focus on the United Kingdom, France, Germany and Spain, and in Asia – focusing on Singapore, South Korea and Japan. The study details that the obligation to encrypt information often

Considerations for Using Tokenization to Mask Your Sensitive Data

When companies think of protecting sensitive data, they are most likely to think of encryption as the means to obfuscate the real data. Tokenization can be a good alternative to encryption in some cases, or it can be a complementary solution that works with encryption to provide a very high

Workers ignoring IT policies on data protection: study

Latest News

CIOs are facing an uphill task to keep their corporate data secure because workers will often ignore IT policy to be more productive. 65% of European CIOs believe workers share data using the fastest and easiest method. More>>

Stages of a Successful Information Management Strategy

In the digital age, the amount of information that businesses generate and receive has grown exponentially. At the same time, the importance of this information has only increased. Information management, in previous years a relatively straightforward process, has become something potentially challenging. In the current business environment, all businesses, should consider

Australia and New Zealand’s Data Centres are Least Complex in the World: Symantec

According to a study conducted by Symantec, Australian companies run data centres that are less complex than their overseas counterparts. The study—which surveyed just under 2500 IT professionals in 36 countries—ranked Australia and New Zealand below the international average for data centre complexity.  The US topped the list in terms

Exploring Different Test Data Management Strategies

Test Data Management (TDM) is about the provisioning of data for non-production environments, especially for test purposes but also for development, training, quality assurance, demonstrations or other activities. Test data has always been required to support application development and other environments but until the relatively recent advent of TDM this

BYOD: 10 Tips Enterprises Can Use to Protect Their Data

Bring your own device (BYOD) has become a huge trend as organizations look to reap the productivity benefits of a more engaged workforce while simultaneously making the company a more attractive place to work. According to a study conducted by Vertic, a digital ad agency, it is estimated that enterprise

5 Assumptions You Must Make to Address Data Security Breaches

Data security has become a top concern for IT departments, thanks with the rise in BYOD. More than ever, employees can access and store sensitive data on their personal mobile devices, making it vulnerable to becoming lost or stolen. “No matter the size of the company, from SMBs to large enterprises

Top