-
To that picture, you have to add the entire context of cyber security, or Network and Information Security in the Digital Agenda for Europe.
FORBES: The EU's 'Right To Be Forgotten': What Data Protections Are We Missing in the US?
-
The European Network and Information Security Agency (ENISA) has been working on a framework that sees data protection as a basic human right, a protection that is offered to consumers within a social context.
FORBES: The EU's 'Right To Be Forgotten': What Data Protections Are We Missing in the US?
-
"I believe that as we increase our dependency on Internet of Things, and because it is not a fully stable technology per se, the probability of having problems increases, " says Evangeis Ouzounis, the head of the secure infrastructure and services unit at the European Network and Information Security Agency.
CNN: SHARE THIS
-
Within information technology, the one bright spot has been network security and Perry says the companies to buy are Symantec (nasdaq: SYMC - news - people ) and Safenet (nasdaq: SFNT - news - people ), which has deals with the Department of Defense and Microsoft (nasdaq: MSFT - news - people ).
FORBES: Magazine Article
-
On the other hand, these applications can present security risks, such as an unintended transfer of information and data on the smartphone via the network.
ENGADGET: Panasonic and Red Bend Software announce Android security partnership at MWC
-
Unfortunately, people operate on human time scales and are simply incapable of discovering all of the information about a network that changes from hour to hour and turning that data into changes in the configuration of security devices.
FORBES: A New Approach To Protect Against Cyber Attacks
-
The good news for RSA Information Security is that no company is immune to the advanced cyber threats brought on by this age of network connectively.
FORBES: Hackers Steal Sensitive Data From EMC's Security Division
-
The NYPD also maintains a "Ring of Steel, " a network of 4, 000 sophisticated security cameras that feed information into a central monitoring system to detect questionable or unlawful activity.
WSJ: Judith Miller: How to Stop Terrorists Before They Kill