TITLE

Lower spending poses information security risks

PUB. DATE
March 2009
SOURCE
Slovak Spectator;3/16/2009, Vol. 15 Issue 10, p6
SOURCE TYPE
Newspaper
DOC. TYPE
Article
ABSTRACT
No abstract available.
ACCESSION #
37008559

 

Related Articles

  • Top brass: We're too broke to go on beat. Martin Beckford // Mail on Sunday;9/27/2015, p18 

    POLICE chiefs have given a stark warning to Ministers that the next wave of massive spending cuts poses a 'considerable risk to national security', it can be revealed.

  • Minimizing New Risks the Old-Fashioned Way. Pironti, John // Wireless Week;4/1/2005, Vol. 11 Issue 8, p31 

    Focuses on the information security challenges posed by smartphones and personal digital assistants. Mobile device features that increase the risk of information leakage; Solutions that can minimize the risk posed by information accessibility.

  • Global State Of Energy Industry Information Security. Slocumb, Ray // Pipeline & Gas Journal;Feb2009, Vol. 236 Issue 2, p62 

    The article focuses on the impact brought by spending cuts in the U.S. According to the article, it will have a great effect on technology as well as the effort to strengthen information security at risk. it notes that issues concerning security continued to be the prime importance in the...

  • Under attack. Smith, Tristan // Smart Business Detroit;May2012, Vol. 8 Issue 4, p24 

    An interview with Tristan Smith, information technology manager at First State Bank, is presented. When asked about the steps businesses can take to lower their risk of a security breach, he presents tips to help any business to minimize their risk of security breach. Smith addresses the issue...

  • On Guard. Bender, Eric // Entrepreneur;Nov2003, Vol. 31 Issue 11, p62 

    Interviews Mark Lobel, senior manager in computer security services practice at PricewaterhouseCoopers. Setting the budget for information security; Security risks posed by increasing electronic connection and wireless networks; Employees' lack of security consciousness.

  • Cyberattacks Prompt Response to Security Threat. O'Rourke, Morgan // Risk Management (00355593);Jan2003, Vol. 50 Issue 1, p8 

    Reports on the release of a draft recommendations in securing cyberinfrastructure by the federal government in the U.S. Promotion of education and information sharing on security risks; Installation of security technology for companies and consumers; Allocation of federal spending for computer...

  • Cybersecurity professionals ere the new guardians of digital change: Gartner.  // Express Computer;10/13/2015, p1 

    The article informs that changes in digital devices and services continue to pose risk and security landscapes according to information technology firm Gartner which has pushed organizations to prepare for additional cybersecurity skills to ensure better protection and security.

  • Not Enough Resources Dedicated to Mobile App Security.  // Information Security;May2015, Vol. 17 Issue 4, p10 

    Several charts are presented that show results of the magazine survey indicating that not enough resources are dedicated to firms' mobile application (app) security, including high risk associated with mobile workforce, ripple effect on app security spending and mobile insecurity posing a threat.

  • Leading Edge: Stabilized Approaches in Light Airplanes.  // AVweb;1/18/2013, Vol. 19 Issue 3C, p3 

    The article offers suggestions on lowering the risks posed by night flight.

  • CYBERTALK. Ducoffe, Phil // San Diego Business Journal;6/8/2015, Vol. 36 Issue 23, p8 

    The article focuses on the risks posed by mobile devices to enterprise data security.

Share

Read the Article

Other Topics