UPMC pulls online drug form: http://www.post-gazette.com/pg/05147/511216.stm
Recent IT Security Articles that include actual security compromises of companies, corporations and government entities. Also, in most cases,provides the breakdown in regulatory and industry security monitoring/protection requirements.
Friday, May 27, 2005
Thursday, May 26, 2005
Citibank, Daring to Dream of the Year 2054, Warns of Lessons of History
Innovation, plus infrastructure investment in databases, mobility and security can fend off obsolescence, says Citibank.com exec.
Columnists: White Hat or White Whale?
Columnists: White Hat or White Whale?
Sometimes an obsession over any one security approach, whether it's policy or a specific technology, can be a very unhealthy thing overall.
Is Your Boss Monitoring Your BlackBerry?
Is Your Boss Monitoring Your BlackBerry?
Private messages exchanged using corporate BlackBerry wireless devices might not be quite so private after all as evidenced by a recent lawsuit filed in Toronto, Canada, by the Canadian Imperial Bank
Security's weakest links
Security's weakest links
Not a month has gone by in 2005 without a far-reaching computer security breach making the nightly news hour.
Hackers break into Stanford University
Hackers break into Stanford University
Computer Weekly May 26 2005 12:19PM GMT
Physical Security Primer (Part 2)
Physical Security Primer (Part 2)
In this article we will continue with our detailed look at applying physical security whenever and wherever possible. In this article we will cover Backup Power. Let's take a look at what you can do t
Phishers get personal
Phishers get personal
Spammers and online fraudsters are exploiting Web site features to learn more about their victims and better target their attacks.
Wednesday, May 25, 2005
High school student accused of hacking
High school student accused of hacking
Chicago Tribune May 25 2005 3:16PM GMT
True single sign-on: So close, yet so far
It says a lot about people and vendors when you can get five of them together to discuss the area in which they all compete. Mostly, though, it says that there's so much business out there that there'...
Doors opening for outsourced security
Companies that offer outsourced enterprise security are overcoming preconceptions and winning over some skeptics.
Hackers could crash Cisco IP phones
A software flaw in Cisco voice over IP phones could allow hackers to crash them.
Students' files hacked at career center
The Career Development Center, or CDC, notified students yesterday that its computer system was ?improperly accessed from outside of the Stanford network? on May 11.
Put policies before products in IT security battle
Two-thirds of respondents to AusCert's 2005 Computer Crime Survey admit there is still room for improvement when it comes to IT security staff training.
Tuesday, May 24, 2005
Subscribe to:
Posts (Atom)