Deleting data from a hard drive is not a matter for the delete key. You need to destroy or degauss the disk or overwrite the data with a tool like Wiebetech's Drive eRazer
It isn't faulty firewalls or inadequate anti-virus software that put law firms at risk of hacktivism, it's business practices, writes Loeb & Loeb's CIO, Judith Flournoy. What can firms do to fight b
...Board, and has lectured frequently for groups such as the SANS Computer Security Institute, MIS Institute, Certified Fraud Examiners, and the Information Systems Security...
Most data breaches could have been avoided with good security practices. But breaches raise issues for electronic data discovery, writes consultant and attorney Albert Barsocchini, particularly for p
The increased corporate reliance on complex applications creates the potential for security vulnerabilities. Attorneys Richard Raysman and Peter Brown discuss Web application security concerns, commo
Back when Microsoft Corp. first offered Windows XP Service Pack 2 to fix security flaws, as many as 40 percent of companies using XP actively avoided the "upgrade," a survey has suggested. While depl
This spring, AssetMetrix Research Labs released a survey regarding the installation of Microsoft Corp.'s Windows XP Service Pack 2 (SP2) in 251 North American corporations, consisting of more than 13
Here are a few tips for finding what you need: