Sign up | Login with →


Is Big Data Security Still Lacking?

April 27, 2017 by Rick Delgado

Some areas in which big data security providers need to develop include ransomware, gaps in the Hadoop security stack, and a corporation’s own data policies which may leave it open to breach. Customer trust is an important and growing necessity in online business transactions. Keeping data secure from threats goes a long way toward reassuring customers that their information is safe with the company they wish to do business.[read more]


6 Tips to Protect Your Business’ Most Important Asset: Your Data

April 3, 2017 by Anita Sathe

Cybersecurity is a top concern for small businesses and everyday digital users. With governments and organizations now placing a greater emphasis on keeping data safe online, it is vital that personal and professional users take note of the dangers that poor cybersecurity can trigger.[read more]

Where the Fog Meets the Edge

March 1, 2017 by Scott Allen

2017 will see the emergence of true fog computing and programmable/intelligent edge devices with the strongest security measures to date.[read more]

Cloudflare admits bug leaked customer data for months

February 28, 2017 by CIO Dive

Cloudflare announced Thursday that its edge servers leaked sensitive data — including customer passwords, cookies and authentication tokens — for months.[read more]

DHS wants to stop the rise of large-scale DDoS attacks

February 22, 2017 by CIO Dive

The Department of Homeland Security is funding new research to stop distributed denial of service (DDoS) attacks[read more]

Practical Ways to Protect Customer Information

February 14, 2017 by Larry Alton

Protection of Customer Information Should be a Priority in 2017[read more]

After years in hiding, SQL Slammer worm returns with a vengeance

February 6, 2017 by CIO Dive

SQL Slammer, a computer worm that first appeared in January 2003, is back, according to Check Point, which detected a massive increase in the number of Slammer attack attempts between Nov. 28 and Dec. 4, 2016.[read more]

Data Security: Ransomware-as-a-Service and What To Do To Avoid It

February 3, 2017 by Kyle Cebull

Ransomware-as-a-Service (RaaS) doesn't sound like something you'd want to include in your technology toolset, does it?Data security should be high on your list of technology priorities. Similar to software-as-a-service (SaaS), RaaS is software that you--or one of your employees--download from the internet or click on a link in an...[read more]

HTTPS now the rule, rather than the exception

February 2, 2017 by CIO Dive

Sites implementing HTTPS doubled in a year and browsers are holding non-secure sites more accountable.[read more]


3 Lessons for enterprise Businesses After Yahoo's Admission of a Massive Data Breach

January 11, 2017 by Sean Mallon

Yahoo! faced a myriad of scandals during 2016. The company is facing a lawsuit after CEO Marissa Mayer was accused of illegally terminating male employees. However, the biggest problem the company faced was a recent data breach.What can other large organizations learn from this fiasco?Background of Yahoo!’s Data BreachThe Yahoo data...[read more]

Expert: Most enterprise data breaches avoidable

December 29, 2016 by CIO Dive

Many cyber security failures can be traced back to sloppiness on the part of the company.[read more]

Report: Social network data theft a leading cybersecurity concern in 2017

December 23, 2016 by CIO Dive

Leaks of personal data collected by technology companies and online services will be among the major cybersecurity threats of 2017, according to a new study from Kaspersky Lab[read more]


Hackers Slip into Networks During High Traffic Times: Here’s How to Stop Them

December 22, 2016 by Marc Sollars

Threats are burrowing inside company networks every time the network is busy. Peak demand events, like stores’ sales and Holiday shopping, give criminals cover to introduce malware onto networks – or carry out exploits such as harvesting consumers’ personal details using malware dropped on the network months before.[read more]

Globalization, Cloud and Mobility Change Network Needs

December 21, 2016 by Ofir Agasi

Although cloud migration is rampant in enterprises right now, it may take a while for organizations to migrate networks to the cloud. Many companies rely on highly complex, layered networking solutions that represent substantial monetary and time investments. However, the next time your organization re-evaluates its networking approach, consider the unique advantages the cloud can offer.[read more]

Yahoo reveals another hack impacting 1B user accounts

December 15, 2016 by CIO Dive

Yahoo revealed Wednesday the company suffered a separate data breach in August 2013, compromising the data of more than one billion user accounts.[read more]