The Defense Department is taking steps to lift a 10-month-old ban on the use of most removable storage devices on Pentagon and military networks, but with a catch: only government-owned and procured USB flash media will be allowed.
Jobs in information security -- including architects, analysts and administrators with hot skills and competencies -- are among the IT opportunities offering the most employment security in the current economy.
This is the news from Foote Partners, LLC, a Florida-based research consultancy that focuses on IT...
For the second time in four months, the Commonwealth of Massachusetts has pushed back the implementation of its new data protection law - one of the toughest in the nation.
Yet even with the new deadline of January 2010, many of the businesses impacted by these stringent data protection requirements won't be...
This report includes the input of over 2,000 companies running AIX and IBM i (i5/OS) environments regarding their data protection, recovery and optimization technologies and strategies.
Learn how your peers are striking the balance between the often antagonistic priorities of optimum IT availability and...
Reported data breaches increased by nearly half in 2008, and 12 percent of the total hacks were at financial institutions - up from 7 percent in 2007.
This is the news from the Identity Theft Resource Center's (ITRC) 2008 breach report, which shows that 2008's 656 reported breaches were up 47 percent over 2007's...
In stepping up the fight against cyber crime, Michael Chertoff, Secretary of the US Department of Homeland Security (DHS), has a simple request: Send some of your best & brightest employees to help the government's efforts.
"We want your ideas, insights and I daresay your employees," Chertoff told the crowd in a...
Encryption is the method of encoding information using a password, in order to hide the real information from others. The technique is used for various tasks, including secure storage and transferring data between computers and wireless networks.
Storing information on computers is an everyday occurrence for most computer users, both at home and work. Solid state drives, external hard drives, online storage and file servers are some of the common devices used for storing valuable information. Read about each of these below for the common uses of each one.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.