Gaudin, Sharon
May 2000
Network World;05/08/2000, Vol. 17 Issue 19, p122
Trade Publication
Focuses on threats posed on company data security by employees in various industries in the United States. Different forms of employee threats; Technologies and products designed to secure data perimeters; Need for businesses to educate executives regarding possible employee participation in breaching data security.


Related Articles

  • Economic espionage explosion.  // Security: Solutions for Enterprise Security Leaders;May98, Vol. 35 Issue 5, p14 

    Discusses the increasing breaches in information and physical security linked to competitive intelligence and corporate espionage in the United States. Diversity of espionage efforts; Trends responsible for the rise in computer-aided economic espionage; Measures for obtaining trade information;...

  • Protecting a company from theft and fraud. Bourque III, Arthur J. // Supervision;Jul95, Vol. 56 Issue 7, p3 

    Discusses ways that a company can adopt to guard against employee theft and fraud. Signs of precaution and mistrust; Need for additional security measures for certain types of operations; Possibilities of lost profits created by industrial espionage; Development of security policy; Observance...

  • Vulnerability Scanner Showdown. Green, John // SQL Server Magazine;Feb2009, Vol. 11 Issue 2, p26 

    The article reviews the database vulnerably scanners AppDetectivePro (ADP) 5.4.6 from Application Security Inc. and AuditPro Enterprise (APE) 4.0 from Network Intelligence Corp.

  • A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications. Trif, Silvia; Vişoiu, Adrian // Informatica Economica;2011, Vol. 15 Issue 2, p119 

    This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database. The types of Business Intelligence Mobile...

  • NEW PRODUCTS. Reinholz, Brian // SQL Server Magazine;Jun2011, Vol. 13 Issue 6, p38 

    The article offers brief information on several information technology (IT) products, including the database security solution from McAfee Inc., the Tabs Studio v. 2.3 Visual Studio and SQL Server Management Studio from Sergey Vlasov, and Panorama Necto business intelligence (BI) solution from...

  • Should Data Professionals Take a Hippocratic-like Oath? Mulling, Craig S. // Database Trends & Applications;Jun2006, Vol. 20 Issue 6, p26 

    The article discusses the increasing number of data breaches and the oath of data professionals to practice secrecy of company information in the U.S. It was noted that while these breaches are on the rise, little is being done to address the problem. One of the cases regarding information...

  • PERSONALIZED DATA SET FOR ANALYSIS. Gupta, Vishal; Saxena, Ashutosh // International Journal of Database Management Systems;Nov2010, Vol. 2 Issue 4, p37 

    Data Management portfolio within an organization has seen an upsurge in initiatives for compliance, security, repurposing and storage within and outside the organization. When such initiatives are being put to practice care must be taken while granting access to data repositories for analysis...

  • Metrics programmes need a clear plan to justify security investment. Newcombe, Lee // Computer Weekly;9/16/2008, p12 

    The article reports that those who are responsible for information risk in an organization to judge the effectiveness of their strategy and associated security solutions are attempting to implement metrics programs to measure the business value and/or ongoing effectiveness of an information...

  • RSA beta tests Cognos 8.2 to boost auditing. Saran, Cliff // Computer Weekly;5/22/2007, p6 

    The article reports on the move of Royal & SunAllliance, an insurance company, to upgrade its business intelligence application. The insurer will move from Cognos Controller version 2.3 to Cognos 8.2 Controller to improve the efficiency of its auditing processes. Andrea Evans, manager of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics