Protecting Privacy: Is a Big Data Marketplace the Answer?
Big data may not be completely understood by everyone, and there are certainly things that remain unclear about it’s purpose.…
Ramifications of IT Infrastructure Everywhere
Most people don’t notice that information technology pervades our daily lives. Granted, some IT infrastructure is in the open and…
Cyber Security: How to Cover Your SaaS
While attending various conferences, roundtables and other information security gatherings, a common theme that often presents itself is the concern…
Attention Retailers: How to Avoid Being Attacked
I feel like I’m stuck in Bill Murray’s Groundhog Day. Yet again, it came to my attention that a major…
The Four IT Security Principles: A Practical Guide to Improving Information Security
Below are four principles to help you become a more effective IT security leader. While these principles won’t solve all…
Big Data Needs to Work Toward Security Solutions Now Before It’s Too Late
Big data is certainly a buzz word, but it’s not going anywhere. Instead, big data is only getting bigger and…
Top Apps and Programs to Protect Google Nexus Devices
Mobile devices have become prolific, and with that popularity has come an increased need for security. It's simple really: as…
New Report Reveals Portable External Hard Drive Led to Data Loss
by Zaid Rasid In January of 2013 we told you about a data loss event that occurred inside a Canadian federal…
How Hackers Use SSL Strip to Obtain Secure Passwords [VIDEO]
Passwords are generally considered the first line of defense between cyber criminals and your data. In order to help prevent…