List/Grid Security Subscribe RSS feed of category Security

datstat

Companies Battle Data Breaches

Businesses are still coping with cyber-related data theft. The breaches at luxury retailer Neiman Marcus and discount retailer Target Corp. are now chapters in modern business archives. ...
200445110-001.jpg

Walking the Data Privacy and Security Tightrope

In order to succeed at their jobs, employees need to have all of the right data within easy reach. This is not an unrealistic expectation; in fact, when employees are functioning at ...
samsng u450

Surveillance Software for Your Cell

With many forms of crime on the increase, the use of surveillance software on web-based devices is becoming the norm. Mobile phone monitoring is the most popular because of the cell ...
third party security

5 Benefits of Using a Third-Party Code Analysis Tool to Boost Application Security

Is there a need to use third party code analysis tools in ensuring the security of an application? Isn’t the review conducted by the developers themselves enough? Some may think of ...
privacy

Differences in Privacy Laws Between the US and EU

While the US and the EU may enjoy good international relations, there are some notable differences in privacy laws between the two superpowers.  To help you gain a better understanding ...
© 2014 TechSling Weblog. All rights reserved.
Designed by TechSling Online.