Shifty, but secure eyes
by Inderscience | August 29, 2012 | alphagalileo.org
A biometric security system based on how a user moves their eyes is being developed by technologists in Finland.
10 Tips For Protecting Mobile Users
by Ericka Chickowski | August 27, 2012 | darkreading.com
Mobile employees, devices, and data need protecting. Here are 10 tips to make it happen.
Tech Insight: Speeding Up Incident Response With Continuous Monitoring
by John H. Sawyer | July 20, 2012 | darkreading.com
Increase speed and effectiveness of incident response through continuous monitoring and enterprise IR tool integration
Higher retail wages correlate with lower levels of employee theft
by L. Brian Stauffer | July 30, 2012 | phys.org
A study co-written by a University of Illinois business professor shows that higher wages are associated with lower levels of employee theft, shedding light on the impact that compensation practices have on shaping employee honesty and ethical norms in organizations.
10 Ways Enterprises Can Battle Malware
by Information Security Media Group | July 26, 2012 | govinfosecurity.com
As malicious code rapidly evolves, the National Institute of Standards and Technology is updating its guidance to reflect changes in the threat malware presents organizations.