[TechRepublic] $781 million spent trying to read privacy policies

IT Security

TechRepublic Member | May 22, 2012

Reading online privacy policies cost us $781 million per year

Michael Kassner interviews two privacy researchers who feel we are spending too much to understand privacy policies. Read more

Resource of the day

Simplified Management in the Real World with VMware vCenter Operations

With so much of your network becoming virtual, it can be difficult to visualize and manage things. Check out this webcast to learn more about simplified management in a virtualized world.


What you should know about Windows 8 security features

Alfonso Barreiro takes a detailed look at all the security features available in each edition of Windows 8, including what's brand new, improved, and carried over from previous versions. Read more

Posts from TechRepublic

 

How to achieve SSL offloading with Citrix NetScaler load balancers

John Joyner shows how the Citrix NetScaler load-monitoring service works and explains the benefits that it offers. Read more

Quick tip: How to limit access to a web directory by IP address

Ryan Boudreaux explains how to set up an .htaccess file that will limit access to your web directory based on IP address. He also explains the pros and cons of using this method. Read more

Scuba dive with FOSS? There's an app for that

Looking to try a new summer activity? Marco Fioretti highlights some open source software that helps scuba divers keep track of their vital dive data. Read more

Posts from ZDNet

 

Anonymous hacks Bureau of Justice, leaks 1.7GB of data

Anonymous has apparently hacked the United States Bureau of Justice Statistics and posted 1.7GB of data belonging to the agency on The Pirate Bay. This is a Monday Mail Mayhem release. Read more

Featured multimedia

 

How to switch boot partitions through a VPN tunnel

View on site



Today's recommended downloads

Why Preventing Fragmentation Is Good for Your Budget (Condusiv Technologies)

The Evolution of the Electronics Industry (IBM)

Windows Defragmenter: Not Good Enough (Condusiv Technologies)

Beyond Simple Total Cost of Ownership (SuccessFactors)

How Midsize Banks Can Overcome Escalating Security Threats (IBM)


 

Message to subscribers

The IT Security newsletter is now a co-branded TechRepublic and ZDNet offering. In addition to TechRepublic IT Security bloggers' tips on how to protect your network, you will get ZDNet Zero Day bloggers' posts about the latest in vulnerabilities, software/hardware security research, and more. We hope you enjoy this expanded security coverage.


TechRepublic's IT Security blog

ZDNet's Zero Day blog

Connect with TechRepublic

TechRepublic  Facebook Fan Page

Follow  TechRepublic on Twitter

These 'Alpha Geeks' are already living in the future (photos)

The thinkers, designers, engineers, and hackers at the center of the maker movement are focused on the innovation business. At the MAKE Hardware Innovation Workshop last week, the open-source community shows its dedication to giving back more than you take.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic UK

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is techsubscriptionss@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic and ZDNet are registered service marks of CBS Interactive, Inc.

TechRepublic
ZDNet
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment