Sign up | Login with →

Security

exclusive

From Police to Partner: The Changing Role of IT

December 12, 2014 by Tom Smith

IT security / shutterstock

IT professionals must adopt a new role that strikes a balance between employee needs and preferences and security. Here are four things you need to effectively become a partner rather than a policeman, while maintaining a secure company infrastructure.[read more]

exclusive

Scary Security Concerns With the Internet of Things

December 5, 2014 by Rick Delgado

IoT.

Internet security is already a multibillion dollar industry, and having to add new features in order to grant greater protection for the new IoT promises to make this industry ever more expansive. However, this means that the burden of promising to provide the utmost in security is even greater than before.[read more]

Dynamic Cybersecurity Needs: Reassessing Security

November 30, 2014 by Thu Pham

cybersecurity needs

As a recent report on Defending Data by Nuix found, cybersecurity needs are dynamic - 73 percent of surveyed participants report that their organization’s cybersecurity needs have changed in the past year. Another 69 percent expect their needs to change again within another year.[read more]

Big Data Ethics and Your Privacy [INFOGRAPHIC]

November 29, 2014 by Mark van Rijmenam

Internet saturated nations

Unlike a few years ago, a lot more people understand that services like Google, Facebook or Twitter are not free of charge, but are paid for with our data. How do we feel about that? How do we feel about privacy and security? And what are some of the common Internet values related to privacy?[read more]

exclusive

Mobile Apps, Business Apps and Network Security

November 28, 2014 by Rick Delgado

mobile apps

Today’s cybercriminals are inventive. They’re creative and find an increasing number of ways to access and exploit personal and professional information. Criminals aren’t respectful of the work-life balance. If we use our personal computer at work, and then bring it home for personal use, our work information on the device is still up for grabs.[read more]

exclusive

Protecting Your Business from Shellshock

November 19, 2014 by Rick Delgado

Shellshock

Shellshock is a bug that affects the UNIX-based shell, found commonly in Linux and Apple operating systems. The vulnerability allows attackers to remotely execute code on these machines, leading to data theft, malware injection and server hijacking. Here are a few ways to protect yourself.[read more]

exclusive

Warning! When Big Data Turns Bad

November 18, 2014 by Bernard Marr

As with all game-changing technologies, Big Data has the potential to be used for evil, as well as good. There are two common ways that “bad things” will often happen: malice, or maladministration. Sometimes big data technology is misused to deliberately cause harm to others, and sometimes it is simply used incorrectly, therefore causing harm.[read more]

Self-Healing Virtual Machines Coming to Datacenter Near You?

November 18, 2014 by Natalie Lehrer

One of the more exciting inventions in data center technology has been developed by a team of computer scientists from the University of Utah. The invention is being called A3 which is short for Advanced Adaptive Applications. When unusual activity is detected, A3 tries to automatically repair the code infraction.[read more]

exclusive

What Every Business Owner Needs to Know About Data Sovereignty

November 16, 2014 by Ajay Patel

Protecting your data

Lately data protection has become the number one concern for business owners. However, if you want full data protection, you should understand what’s behind data sovereignty. From knowing up-to-date laws and regulations to understanding cloud technology, you can ensure data privacy for your business and your customers.[read more]

Meeting the Business Technology Needs of Midsized Companies

November 14, 2014 by Julie Hunt

Current technology trends are important for all organizations. Most midsized companies have these technologies at the top of their lists: Mobile, Analytics, Cloud, and Security. And each year many midsized organizations dedicate more budget for technology as a strategic investment, as Deloitte noted in a recent study.[read more]

The Complex Process of Keeping Access Governance Software Simple

November 1, 2014 by Ryan Ward

Keep it simple.

With the rapid growth of the access governance software market, you would think that access certification issues would be a thing of the past. Unfortunately, most solutions are missing the boat because they are either cumbersome to use or they are niche solutions that do not integrate with target systems or a core identity and access management solution.[read more]

exclusive

The Harmful Side of Big Data: Identity Theft

October 29, 2014 by Anand Srinivasan

Identity theft.

Big data presents a huge opportunity for cyber criminals to get access to millions of records with lesser effort. So how does one protect themselves from a big data breach?[read more]

How Virtualization Can Improve Security

October 18, 2014 by MIKE20 Governance Association

Security.

Virtualization can do a lot for a company. It can increase a business’s efficiency, doing more work with less equipment. Virtualization can also save on costs, particularly when it comes to cooling down servers and getting things back up and running after a technical disaster.[read more]

exclusive

How to Create Users in Oracle BI (OBIEE) and WebLogic Tutorial

October 15, 2014 by Julie Johnson

Oracle BI.

This short guide will take you through the process of creating new users in Oracle OBIEE and WebLogic as well as introducing security concepts including the use of security groups and application roles to control data access.[read more]

How to Keep Your iCloud Account Safe From Hackers

October 11, 2014 by Rick Delgado

Safe iCloud.

Since hackers leaked nude photos of more than 100 celebrities from their phones to the Internet, people have been concerned about the security of the iCloud service, where the photos were stored. Fortunately, there are steps you can take to avoid becoming the victim of a similar attack.[read more]