www.fgks.org »
Address
:
[go:
up one dir
,
main page
]
Include Form
Remove Scripts
Accept Cookies
Show Images
Show Referer
Rotate13
Base64
Strip Meta
Strip Title
Session Cookies
Mobile Version
Subscribe
Contact Us
About Us
Advertising
Editorial
SC UK
SC Aus/NZ
Home
News
Features
Opinions
Congress News & Opinions
Products
Sectors
News Bytes
Canada News
Newsletters
Products
Group Tests
First Looks
Products
About Reviews
Blogs
The News Team Blog
The Data Breach Blog
The SC Magazine Awards Blog
Buyers Guide
Whitepapers
Jobs
Events
SCWC 24/7
SC Awards U.S.
Editorial Webcasts
Vendor Webcasts
SC World Congress NYC
SC Congress Canada
Podcasts
SC Awards Canada
Subscribe
Newsletters
Subscribe to SC
Archive
SC World Congress
Archive
Topic Center:
Financial Services
Health Care
Retail
Government
SC Awards
SC Canada
SC Scholars
Cybercrime Corner
RSS
|
Login
|
Register
Home
>
Sectors
> Government
Latest Government News and Opinions
Senate votes to exempt lawyers, doctors from Red Flags
Angela Moscaritolo
December 02, 2010
Lawyers, doctors and accountants may avoid having to comply with the Federal Trade Commission's new identity theft rule.
Dealings with Facebook better, says privacy commissioner
James Hale
December 02, 2010
A Q&A; with Privacy Commissioner Jennifer Stoddart covering social media, smartphones, educating the public and much more.
Government site exposes citizen data
James Hale
December 02, 2010
An error in Service Canada's new Access Key site, which was launched on September 26, inadvertently exposed the social insurance numbers and banking information of about 75 people.
WikiLeaks prompts U.S. government to assess security
Dan Kaplan
December 01, 2010
The federal government is moving quickly to deploy new security measures in light of the leak of hundreds of thousands of classified U.S. documents by whistleblower site WikiLeaks.
Don't-track-me browser feature part of FTC privacy plan
Angela Moscaritolo
December 01, 2010
The Federal Trade Commission (FTC) is urging companies to develop a "do not track" mechanism so consumers can choose whether to allow the collection of data regarding online searching and browsing activities.
more »
Subscribe to the RSS for this page [
view all our RSS feeds here
]
Most Popular
Most Emailed
Most Recent
Innovators 2010: The top security companies
Political hacker takes credit for Wikileaks DDoS attack
WikiLeaks absorbs more DDoS attacks
Stuxnet to Gonzalez to Snoop: The year in lists
Top of the heap: 2010's IT security luminaries
Debate: Free anti-virus software is as effective in protecting users as a paid solution
WikiLeaks prompts U.S. government to assess security
Microsoft looks into Windows privilege escalation exploit
Critical infrastructure lacking cyber supply chain security
Senate votes to exempt lawyers, doctors from Red Flags
FBI warns of SMS and phone-based phishing scams
Facebook, Twitter fail latest security assessment
Federal gov't releases draft cloud security guidelines
Scammers ready to pounce on Cyber Monday deal-hunters
Breaches cost health care industry $6 billion annually
Senate votes to exempt lawyers, doctors from Red Flags
SC World Congress continues success in its third year
Eight questions CIOs should ask on cloud security
Best practices for security awareness training
Class-action lawsuit brought against AvMed over breach
Accused Mega-D botnet operator arrested
Senate votes to exempt lawyers, doctors from Red Flags
Dealings with Facebook better, says privacy commissioner
Small businesses not taking advantage of cloud offerings
Government site exposes citizen data
WikiLeaks prompts U.S. government to assess security
Don't-track-me browser feature part of FTC privacy plan
Cyberthreats: A long haul
IT security budget issues: Fiscal reality
Top of the heap: 2010's IT security luminaries
Popular Topics
Access Control
Breaches & Exposures
Consumer Threats
Critical Infrastructure
Cyber Attacks
Cybercrime
DDoS
Finance
Government
Healthcare
Identity Theft
Insider Threat
Law Enforcement
Malware
Mobile Devices
Mobile Endpoint Security
Nation State
Phishing
Privacy
Retail
Social Networks
Spam
Spam Techniques
Stuxnet
Vulnerabilities & Flaws
Sponsored Links