eSecurity
Home
eMarketing
eSecurity
Mobile Comm
Global e-Business
News & Insights
Contact Us

Articles

eMarketing
eSecurity
Mobile Comm
Global e-Business
News & Insights
Contact Us

Security Breach at Target Part 2: The Alternative to Centralized Consumer Data System
In Part 1 of Target Security Breach, we have discussed several underlying factors that made Target top victim to cyber-attacks. In this article, I would like to focus on the solution side ...
Author:
Lan Lin
Category: Internet Security
Date Posted: February 19, 2014

FIDO Alliance Seminar
I attended a seminar organized by FIDO (Fast Identification Online) Alliance on Feb. 14, 2014 at Garden Court Hotel in Palo Alto. There were about 60 people attended the seminar...
Author:
Steve Tsai
Category: Internet Security
Date Posted: February 17, 2014

Security Breach at Target Part 1: How and why did it happen?
A string of large-scale data breaches hit big-name retailers such as Target and Neiman Marcus in 2013 year-end holiday season. They highlight the public's growing concern on the security of consumers' online data and privacy ...
Author: Lan Lin
Category: Internet Security
Date Posted: February 03, 2014

The Big Myths on Web Services Security
Is Web Services security too heavy to use? Can we keep it simple and secure for Web Services security?
Author: Judy Silk
Category: Internet Security
Date Posted: January 26, 2014

End-to-End Security for Cloud Computing Environment
Common Concerns That People Have When Considering Using Cloud Computing
How Do I Insure That My Data is Safe and Secure Out In the Cloud?
Author:
Steve Tsai
Category: Internet Security
Date Posted: January 12, 2014

Optimize Security Services in the Cloud
As the Software-as-a-Service (SaaS) getting widely deploys into the cloud computing environment, more and more security vendors are providing security technologies as a service...
Author:
Judy Silk
Category: Internet Security
Date Posted: December 20, 2013

Data at Rest, Data at Risk?
As the security landscape changes and data privacy regulations are driving enterprises to seriously protect data at rest. However, the security measures that enterprises employ to secure data at rest have many challenges...
Author: Steve Tsai
Category: Internet Security
Date Posted: December 2, 2013

Vital Records Agency Information And Data Security Best Practices
Vital Record agencies are confronted with information and data security issues as important concerns in today's technology-enabled world. Companies...
Author:
Lan Lin
Category: Internet Security
Date Posted: November 17, 2013

Common Criteria: A Prime Factor In Information Security For The DOD
Is your vital selective information secure. How do you know. There ar several ways to increase confidence in the security measures of your vital entropy. The data could be moved...
Author:
Donald Jones
Category: Internet Security
Date Posted: October 20, 2013

Trained Information Security Professionals The Need of the Hour
According to a Deloitte Survey, more than 50% of companies surveyed admitted to having a data loss in from... June 2012 - June 2013
Author:
Jerry Nelson
Category: Internet Security
Date Posted: September 19, 2013

How To Protect Requested Confidential Social Security Information?
Social Security information requested by members should be treated with utmost care and must be kept securely. As much as it is the obligation and function of the Social Security to ensure the confidentiality...
Author:
Jinky C. Mesias
Category: Internet Security
Date Posted: June 15, 2013

Virtual VPN Gateway
Virtaulization has become a clear trend. Data center server and storage consolidation saves space, energy, and operating cost. In the current economic environment, all these make economic sense...
Author: Steve Tsai
Category: Internet Security
Date Posted: April 15, 2013

Don't Hack the Ox!
The year 2013 is the Year of the Ox, according to zodiac calendar.  The ox is the second animal in the zodiac and often associated with honesty, responsibility, faithfulness and gentleness. Web based applications provide....
Author: Szu Chang
Category: Internet Security
Date Posted: March 12, 2013

Remote Control Software  The 6 Security-Pitfalls You Should Avoid
There are numerous ways for an individual to gain access to your confidential information and business data on your computer when you employ remote control software. In spite of the risks it is not n...
Author: Kristian Polack
Category:
Computers & Internet
Date Posted: September 12 , 2012

Data Security at Risk?
As the security landscape changes and data privacy regulations are driving enterprises to seriously protect data at rest. However, the security measures that enterprises employ to secure data at rest have many challenges...
Author: Szu Chang
Category: Internet Security
Date Posted: March 22, 2012

CCNA Certification Exam Training: Passwords, Cisco Routers, And Network Security
CCNA certification is important, and so is securing our network's Cisco routers! To reflect the importance of network security, your CCNA certification exam is likely going to contain a few questions...
Author: Chris Bryant, CCIE #12933
Category:
Computers & Internet
Date Posted: February 14, 2012

NAC Forum
Network Computing held a forum on Network Access Control at Fairmont Hotel in San Jose on January 25, 2007. John Siefert, the publisher of Network....
Author: Steve Tsai
Category: Internet Security
Date Posted: January 29, 2008

The U.S. eSecurity Market
The total E-Security market is about $17.2B in 2005 according to IDC. There are 400 private companies and 20 public companies in the E-Security sector in the U.S....
Author: Steve Tsai
Category: Internet Security
Date Posted: December 18, 2007

eSecurity Philosopy - Applying the Concept from The Art of War
Cyber attackers have evolved from amateur hackers to professional criminals. They are now more sophisticated, better organized, and better funded....
Author: Szu Chang
Category: Internet Security
Date Posted: December 11, 2007

Windows XP Tips for Computer Security
Here are a couple of tips to speed up your Windows XP computer and help keep you protected and secure online. First you need to control which programs load on startup: Many of the programs you instal...
Author: Chris Kaminski
Category: Computers & Internet
Date Posted: December 06, 2007

Computer Security - Startling Facts
Working on the Internet provides Internet marketers with the opportunity to make a living in the comfort of their own home. Computer Security includes threats such as viruses, identity theft, spyware...
Author: Peter Crest
Category: Computers & Internet
Date Posted: December 04, 2007

Encryption: Security Tool For Internet
Web site security is a complex and perhaps even controversial subject. On one side there are individuals whom regard themselves as the freedom fighters of the technology and information era; on the o...
Author: Elizabeth Thomas
Category: Computers & Internet
Date Posted: November 27, 2007

Checking Computer Security
Many people wonder whether or not their computer is secure. They fear that someone might be looking through their files, copying, altering, or erasing them. They are uneasy about the thought that som...
Author: Donald Brown
Category: Computers & Internet
Date Posted: November 14, 2007

Computer Security Against Data Loss And Identity Theft
This week I was going to write about upgrading system RAM but while watching the news I saw the story about Hotels.com and their data theft. Last weeks big story was the data lose at the Veterans Adm...
Author: Chris Kaminski
Category: Computers & Internet
Date Posted: November 02, 2007

Local Residents Under Threat From Poor Computer Security
Local businessman and computer expert Dave Page, who runs Hybrid Computers, is warning home computer users in the Aylesbury area to beware that they are leaving themselves open to identity theft, spy...
Author: Dave Page
Category: Computers & Internet
Date Posted: October 10, 2007

Training For Security In Todays Computer World
Security training and certification will not only help keep students safe online, but gives them just one more certification to add to their resume to make them more marketable to potential employers...
Author: Shannon Margolis
Category: Computers & Internet
Date Posted: September 11, 2007

Computer Security Software
Computer protection software assists you in detecting unwanted utilization of your PC and exploitation of personal information. The info pulled out by unjust methods can be made use of to the hacker'...
Author: Joshua Miller
Category: Computers & Internet
Date Posted: September 10, 2007

Internet Security and You - Take Action
It amazes me that for whatever reason people tend to overlook this problem time and time again. With the expansion of the Internet comes more threats. There are people in this world that want to caus...
Author: Anthony Norton
Category: Computers & Internet
Date Posted: August 21, 2007

Internet Security - How Safe is Our Worldwide Web?
Are you aware that behind the scenes a depraved snake is watching, slithering through Internet security loopholes, ready to strike at any moment? Despicable, swindling crooks prey on unsuspecting vi...
Author: Marguerite Pickett
Category: Computers & Internet
Date Posted: August 21, 2007

Security and Internet Browsers  Firefox vs. Internet Explorer
Introduction The Internet is becoming a more and more dangerous place to be, due in no small part to the inherent security risks posed by viruses and spyware. Additionally, applications that access ...
Author: Igor Pankov
Category: Computers & Internet
Date Posted: March 27, 2007

Computer Security  Its Bigger Than Spyware And Viruses
Computer security, in basic terms means keeping your computer and the data that's in it safe and secure. More of our personal data is stored in or accessed from our computer, now more than ever befor...
Author: D. David Dugan
Category: Computers & Internet
Date Posted: February 20, 2007

448 Bit Encrypted Security? Sneaky & Slimy Hackers Are Looking For Computer Prey While Your Asleep
"Rest Assured Your Computer Files Are Not As Secure As You Think They Are, This Article On 448 Delta Is The Beginning Stage To Your Hard Drive - Your File Data Security Patiently Awaits Its Purpose;...
Author: Joseph Mercado
Category: Computers & Internet
Date Posted: February 02, 2007

Computer Security Vital
Computer Security Vital Many of us like to believe that we will never need to worry about computer security. We cling to the belief that hackers only strike large corporations and people with serio...
Author: Ruby Vanharen
Category: Online Business
Date Posted: November 04, 2006

Security Necessities To Prevent Your Computer From Spyware
In the internet world it is vital for users to have a good spyware scan and removal tool because of the multitude of different spyware, adware, Trojans and other malware constantly looking to attack ...
Author: Mitch Johnson
Category: Computers & Internet
Date Posted: August 12, 2006

Computer Security - What Exactly Is It?
Although the term 'computer security' is used a lot, the content of a computer is actually vulnerable to only a few risks unless the computer is connected to others on a network. As the use of comput...
Author: Ciontescu Molie
Category: Computers & Internet
Date Posted: April 25, 2006

Basic Steps To Optimize Your Internet Security
After seeing many people complain about their weak Internet security I decided to write down some things that will help you for your Internet security. First, here are some tips to make windows safer...
Author: Popescu Alexandru
Category: Computers & Internet
Date Posted: April 24, 2006

Delete Cookies: New-Age Diet or Common Sense Internet Security?
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and wh...
Author: Nick Smith
Category: Parenting
Date Posted: January 11, 2006

Small Business Computer Security, the Basics
Anyone in business today realizes both the natural dependency on computers in the workplace, and also the potential dangers associated with storing important data on them. Today's business owners ar...
Author: Jarrett Pavao
Category: Computers & Internet
Date Posted: January 05, 2006

Internet Security Basics 101
The explosive growth of the Internet has meant that thousands of people are today experiencing the joys of being online for the first time. With growth there always comes pain. Be it your growing pai...
Author: Niall Roche
Category: Computers & Internet
Date Posted: June 02, 2005

Internet Security Threats: Who Can Read Your Email?
Before being able to choose a secure Internet communication system, you need to understand the threats to your security. Since the beginning of the Internet there has been a naive assumption on the p...
Author: Mark Brooks
Category: Computers & Internet
Date Posted: November 25, 2004

 

[Home] [eMarketing] [eSecurity] [Mobile Comm] [Global e-Business] [News & Insights] [Contact Us]

eMarketing