With IT professionals worried about the slack economy and the high number of jobs moving offshore, some analysts say the most secure position is one in the security arena.
The buzz in the media and an advertising blitz have blurred the line between fraud and identity theft, according to TowerGroup. The result is an identity fraud epidemic that doesn't really exist.
More than 70 percent of consumers will share sensitive information during an unsolicited call or e-mail, according to the 2004 Identity Management Survey.
A national study of Internet users found an increase in spoofing and phishing incidents, costing consumers $500 million, and an increase in skepticism about the Web and e-mail as a result.
Two of the biggest names in computer security announced moves to help the war against phishing attacks this week, as the $1.4 billion problem attracts increasing attention.
Vendors of advanced authentication schemes are taking notice of the $1 billion phishing industry and are taking aim at traditional user names and passwords.
Identity is central to a pair of security programs the U.S. Transportation Security Administration developed to ensure the safety of air travel. What does not appear to be central is security.
Until identities can be verified with reasonable assurance, all the fingerprint scans, holograms, and Java cards in the world won't stop the host of crimes that can be committed with a false identity. Enter ID Analytics.
Until identities can be verified with reasonable assurance, all the fingerprint scans, holograms and Java cards in the world won't stop the host of crimes committed with a false identity. One company says it has a solution.
Thanks to lower price points in the hardware and some clever work by systems integrators, the day when your software prompts you for a fingerprint may come sooner than you expected.
It doesn't take a national disaster to bring a business to its knees. Even mundane occurences such as a power outage or server migration can disrupt business continuity. But too many companies are unprepared.
Security spending at most organizations accounts for somewhere between 2% and 20% of the total IT budget, according to Giga Information Group, and more of this money is being spent on personnel.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?