Glasgow City Council has been fined £150,000 for the loss of two unencrypted laptops, one of which contained personal details of more than 20,000 people.
Author: ISBuzz Team
The overused term ‘Cyber’, along with information security and information assurance, can be broken down into five broad categories.
The North Alabama Chapter of the Information Systems Security Association and Cyber Huntsville are hosting Huntsville’s Fifth Annual Cyber Security Summit on Thursday, June 6th, at the Von Braun Center.
Celebrate your IT excellence at the UK IT Industry Awards 2013 – the benchmark for outstanding performance throughout the UK computer industry.
Many organizations are challenged with finding a way to secure sensitive and proprietary data in the face of shrinking budgets, overstretched staff, and limited infrastructure.
Savvis has been hosting eCommerce platforms for nearly two decades. Internet retailers including easyJet and Hallmark Digital trust us to power their online success.
This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.
The revelation that the National Security Agency seems to be collecting the phone records of millions of Verizon customers is shocking, but it’s actually part of a growing trend in which governments worldwide are relying on widespread, unrestricted surveillance in the name of national security.
On June 6, 2013, a group of 300 gathered in Santa Marta, Colombia, the second oldest city in South America, for the First Latin America Congress on Data Protection.
Defense Secretary Chuck Hagel said on Friday that cyber threats posed a “quiet, stealthy, insidious” danger to the United States and other nations, and called for “rules of the road” to guide behavior and avoid conflict on global computer networks.