Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.


NewsTarget Corp. is asking a federal judge to throw out claims by banks that had to deal with the consequences of a data breach that compromised at least 40 million credit-card accounts.
NewsU.S. Postal Service employee and customer data may have been compromised in a computer hack that lasted at least seven-and-a-half months, the agency said.
BlogEven if big data remained private, it could still expose our secrets to ourselves
ColumnInformation technology security has been a frequent topic in business this year. Not a month goes by without a major security event (BASH, Home Depot, etc.) entering the news cycle. However, the focus on security needs to shift from the technology side of the house to the user, administration and training sides. By deploying best practices, policies and procedures for security measures, your firm can be proactive versus reactive to a security threat.
NewsCost reduction -- particularly in the software space -- is the top priority for IT executives involved in mainframe management, according to a ninth annual BMC survey spanning 1,200 customers.
Information Management NewsConsumers distrust how their data is being used, and organizations need to rethink data privacy approaches to spur innovation, reveals new Intel study
Information Management NewsThere's almost no good way of tell a bank customer that her personal data's been stolen. But some banks do a particularly bad job of communicating during a security incident.
Information Management NewsAs breach incidents and the costs of managing and mitigating breaches increase year over year, global information security budgets decreased from 2013, according to a report from PwC, CIO and CSO
NewsJimmy John's, a sandwich-shop chain based in Champaign, Illinois, said a hacker infiltrated payment systems at about 216 of its locations and stole credit- and debit-card information.
Information Management NewsConnecticut Attorney General George Jepsen wants assurance from Apple Corp. that the Apple Watch product coming in 2015 has sufficient privacy protections.
Information Management NewsGartner analyst says that most enterprises are ‘inexperienced’ in mobile application security
Information Management NewsTo obtain approval and funding for security improvements, bank technologists have to make their case by pointing to losses from recent security breaches. But calculating those losses can be tricky.
Twitter
Facebook
LinkedIn
Please note you must now log in with your email address and password.