Sign up | Login with →

Security

exclusive

It’s Your Life, Starring Your Data

July 27, 2015 by Tamara Dull
1

At a recent EPIC Champions of Freedom privacy event, Apple’s CEO Tim Cook finger-wagged some of his Silicon Valley neighbors—without mentioning names Facebook and Google—on how they were using their users’ data. “They’re gobbling up everything they can learn about you and trying to monetize it. We think that’s wrong. And it’s not the kind of company that Apple wants to be,” Cook said.[read more]

exclusive

Managing Big Data? Make Sure You Know the Challenges

July 27, 2015 by Gunjan Tripathi
1

The ability to collect massive amounts of data has grown exponentially with the advent of the Internet and the number of people who use it. Data collection happens almost as a side effect of other computing activities.[read more]

exclusive

Top 10 Social Engineering Tactics

July 22, 2015 by Gunjan Tripathi

Social engineering is the process of exploiting the weakest part of your security system: the human factor. Social engineers accomplish their goals by a combination of technical sleight-of-hand, and using personal contact to gain trust. Surprisingly, many of these methods do not use technology at all, or only use technology as an adjunct to personal contact.[read more]

exclusive

The Business Takeaways From the Recent Baseball Hacking Scandal

July 17, 2015 by Rick Delgado

Issues related to cyber security are certainly not new, especially in the business world. In recent years, serious concerns have arisen as companies have struggled to overcome the security threats they face. After major security breaches at businesses like Target, Home Depot, and Sony, the sad reality is that many breaches are difficult to avoid, so another story about cyber security woes shouldn’t have come as a surprise.[read more]

UNIX Vs Linux: How Do They Measure Up?

July 16, 2015 by Simon Mitchell

Linux and UNIX are very similar to each other, but they have some common differences – discover what they are in this blog to find out which one is right for your organisation.The history of the UNIX operating system dates back to 1969. Since then it has developed and evolved with the creation of a number of different versions and...[read more]

Best Practice Linux Guide: Your Cloud Strategy

July 3, 2015 by Simon Mitchell

The Cloud is becoming an all-encompassing presence on the Internet. Whether it’s public, private or hosted, your organisation will undoubtedly be under pressure to not only adopt some form of Cloud strategy to keep up with competitors but will also increasingly experience internal pressures to adopt new tools and techniques such as continual integration tools and concepts such as containers.[read more]

exclusive

7 Key Features IT Should Look for in Enterprise Mobility Software

July 2, 2015 by Daniel Kraft

It’s safe to say that the traditional model of “going to work” is a ticking time bomb. Service providers and freelancers are replacing full-time employees, and people are changing careers faster than ever. Companies require employees to be available 24/7, but they can align work with the priorities of their personal lives, working from many places. Clearly, organizations are undergoing some soul-searching for the ideal structure, and mobility is key.[read more]

exclusive

Adopting a User Behavior Analytics (UBA) Solution

June 25, 2015 by Idan Tendler

The key to stopping hackers & rogue employees already exists in the enterprise in the form of user related data repositories. With the right analytics that focus on user behavior, security analysts can gain much needed context to better understand the insider threats they face on a daily basis.[read more]

The Rise and Risk of BYOD (INFOGRAPHIC)

June 19, 2015 by Chris Falgout

The BYOD trend presents its own concerns when it comes to protecting confidential workplace data. As the trend continues to gain steam, CIOs and IT departments are faced with a whole different set of variables due to the variety of devices and the relative level of security that comes with each device. The push to be able to your own mobile device to work is also a push to house personal information and apps alongside company data. It can be a risky endeavor.[read more]

How to Ensure Protection of Critical Business Data

May 26, 2015 by Peter Davidson

Hackers and digital scam artists who make a living out of stealing sensitive business related information from corporate computers have been in existence for as long as the internet has existed. Trade secrets and classified e-mail threads are often published online and sold to the highest bidder by these hackers, which can cause incalculable damage to the reputation and wellbeing of the company in question.[read more]

Employee Training and Other Ways to Protect Your Company’s Valuable Data

May 15, 2015 by Rick Delgado

Employee training.

In the last decade, companies have seen new business opportunities thanks to the advancement in technology. However, these technologies can also pose extreme threats to valuable data of businesses that not only breach their confidentiality and trade secrets, but cause them to lose millions. Along with technology, employees pose equal cyber security threats of company data.[read more]

exclusive

Secure Video Conferencing

May 13, 2015 by Richard Smith

With so many video conferencing options available, it can be difficult to decide on the right solution for your enterprise. According to a recently published study by the Wainhouse Research Group, enterprises are struggling to keep up with an increasingly changing workplace. The study shows that by 2020, Millenials will make up at least half of the global workforce, and with that demographic change will come differences in procedures, tools, and working preferences.[read more]

exclusive

5 Questions to Ask as You Prepare for a Compliance Audit

May 12, 2015 by Brad Thies

For most cloud service providers, a compliance audit is, at best, a necessary evil — the root canal of the business world. Like a root canal, it can be a painful process that you regret about halfway through, even if you know it’s good for you. But just as you can avoid root canals with proper dental hygiene and regular checkups, the pain of compliance audits can be avoided with proper preparation.[read more]

exclusive

Why Returning $1 Trillion to Shareholders is a Bad Idea

May 4, 2015 by Paul Barsch

Risky Business column.

With creaking IT infrastructures and under-investment in other areas such as plants, equipment, employee training and more, excessive share buybacks aren't just a flawed strategy; they are a dangerous one for the future health of companies across the globe.[read more]

IBM Opens Up Its Threat Data as Part of New Security Intelligence Sharing Platform

April 18, 2015 by Sarah Smith

IBM.

IBM has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other network defenders. On Thursday, the company opened up over 700 terabytes of data about vulnerabilities, attacks and other threats through a new cloud-based threat intelligence sharing platform called IBM X-Force Exchange. Other organizations can use the platform to share or confirm their own data, so they can more efficiently respond to security incidents.[read more]