The Big Data Security Transformation
For those of us in the security profession it an extremely exciting but also daunting time. The number and aggressiveness…
SAP’s New Fraud Management Analytical Application
SAP recently announced its new Fraud Management analytic applications. Currently in “controlled” (limited) release, it’s a promising start for the product and a…
HIPAA Breach Lessons Learned
While no records were broken when it comes to number of health records disclosed per data breach, the top HIPAA…
Indoor Locationing: The Hottest Thing in Tech
Apple’s acquisition of WiFiSlam is getting a lot of attention this week. Apple’s acquisition of WiFiSlam is getting a lot…
BYOD: Reducing the Risk with Mobile App Management
It is likely safe to say that the concept of Bring Your Own Device (BYOD) has gained a foothold in…
PCI-Compliant Supermarket Chain Bashas’ Breached
In February, the supermarket chain Bashas’ Family of Stores found unique malware on their network that allowed attackers access to…
Driving Data: A Slippery Ethical Slope?
When thinking about telematics, it’s easy to conjure up images of fleet tracking via GPS, satellite navigation systems for driving…
Big Data: A Revolution That Will Transform How We Live, Work, and Think
Viktor Mayer-Schönberger and Kenneth Cukier, authors of the just-published Big Data: A Revolution that Will Transform How We Live, Work, and…
Genesco Sues Visa Over PCI Noncompliance Fines
On March 7th, the sportswear company Genesco filed a lawsuit against Visa. The issue? In 2010 Genesco’s computer system was…
Cloud Security: Vetting Applications and Cloud Providers for Compliance and Security
The latest report from the Ponemon Institute, located in Traverse City, Michigan, sought to analyze trends in cloud computing security…

