| Old Articles: <Older 9531-9540 Newer> |
 |
InternetNews September 24, 2010 |
FTC Issuing Slim Payments to ChoicePoint Victims Following a settlement stemming from the latest breach from data integrator ChoicePoint, the Federal Trade Commission is distributing paltry compensation to the victims.  |
InternetNews September 24, 2010 |
Target Scores the iPad Apple's hot-selling iPad will be available in Target stores starting October 3. Will that lead to more users looking to IT to support the tablet in the enterprise?  |
InternetNews September 24, 2010 |
Obama Admin Mulls Cybersecurity, Senate Bill Stalls Head of U.S. Cyber Command describes White House-led review of current cybersecurity authorities, while efforts in the Senate for comprehensive reform appear to have hit a roadblock.  |
CIO September 24, 2010 Kim S. Nash |
The Internet of Things: How CIOs Can Influence the Next Wave of Product Innovation CIOs must seize the opportunity created by new data streams from smart products -- the Internet of Things -- to put IT at the center of business innovation.  |
CIO September 23, 2010 Kim S. Nash |
FTC Considers Allowing Consumers to Opt Out of Behavioral Marketing CIOs may need to handle another compliance issue with data-sharing restrictions under discussion.  |
InternetNews September 23, 2010 |
Chrome's Browser Engine Available to IE users Does adding Google's Chrome Frame to Internet Explorer pose a security risk?  |
InternetNews September 22, 2010 |
Senate Ponders Update of Electronic Privacy Act Twenty four years after the passage of the ECPA, much has changed in the way companies and governments collect, store and share electronic data.  |
InternetNews September 22, 2010 |
One-Third of Enterprises Suffer From Data Loss New study from security firm Proofpoint finds that nearly one-third of businesses with more than 1,000 employees were hit with some form of data loss in the past year.  |
IndustryWeek September 22, 2010 |
Industry Just Tapping its Mobile Potential As mobile devices drop in price, more manufacturers are adopting wireless data gathering - and getting a clearer view of their operations.  |
InternetNews September 22, 2010 |
Usage Rules Crucial for Enterprise Security New study finds that remote workers are more likely to venture to forbidden websites but they're better at avoiding malware.  |
| <Older 9531-9540 Newer> Return to current articles. |