Enterprise information security management

Email Alerts

Register now to receive SearchCIO.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Risk management: Think policy first, technology second

    Auditor on your tail? Gartner analysts have six hot technologies that'll impress the inspector -- but with one caveat: Have good policies in place before you buy. 

  • Security screeners sue over missing TSA hard drive

    A union is suing the Transportation Security Administration (TSA) over the loss of a computer hard drive containing the personal information of around 100,000 security screeners. The lawsuit would require the government agency to encrypt employee dat... 

  • Oracle update to fix 37 security flaws

    Oracle plans to release patches to plug 37 security holes in its products next week, according to a preview of the upcoming Critical Patch Update released April 10. 

  • FCC imposes rules to prevent pretexting

    The Federal Communications Commission hopes to prevent data burglaries with a set of new regulations for phone companies aimed at preventing the fraudulent practice called "pretexting." 

  • CIOs not making time for business continuity planning

    Company culture and lack of management support are preventing many firms from planning for downtime or disaster. 

  • T.J. Maxx probe finds broader hacking

    The TJX Cos., the discount retailer best known for its T.J. Maxx and Marshalls clothing stores, said Wednesday that its hacking investigation has uncovered more extensive exposure of credit and debit card data than it previously believed. 

  • Google patches vulnerability in Desktop search tool

    Google has issued a patch for a serious vulnerability involving Google Desktop that would have allowed attackers to steal personal information and possibly take control of a system remotely. 

  • Massachusetts leads national TJX data probe

    The Massachusetts Attorney General is heading up a group of more than 30 states trying to force answers to how the massive TJX data breach happened. 

  • CIOs: Monitoring employees thwarts Internet abuse

    CIOs are increasingly deploying Web filtering and content monitoring tools to keep their networks safe from malware. Big Brother may be watching, but CIOs say too bad -- it's working. 

  • IBM vows solution to identity theft outbreak

    New software developed by IBM promises to put identity management in the hands of the consumer. Will it keep our personal information safe? That depends, analysts say.