Sign up | Login with →

Security

Big Data Needs to Work Toward Security Solutions Now Before It’s Too Late

April 15, 2014 by Tracey Wallace

Big data and security solutions.

In the effort to protect data rights, transparency is key. What will you be doing with a user’s data? How might that change overtime? How will you alert users to data breaches (if it happens) or changes in your use policy? In protecting data rights, your users become an extension of your brand — and thus an asset to secure.[read more]

exclusive

Top Apps and Programs to Protect Google Nexus Devices

April 15, 2014 by Jessica Oaks

Protect Google Nexus devices.

As people's computing and online habits migrate from desktop devices to mobile devices, so too goes the way of the hackers and online predators. Though you may feel unprepared to thwart such risks, there are actually a number of different apps and programs to help protect your smartphone.[read more]

exclusive

How Your Hadoop Distribution Could Lose Your Data Forever

March 27, 2014 by Michele Nemschoff

Hadoop distribution could lose your data forever.

Relational database users have long depended on foundational protection techniques, such as data replication and snapshots. Today, both are also implemented in standard Hadoop architectures. Their method of application and effectiveness, however, is not the same across distributions.[read more]

New Report Reveals Portable External Hard Drive Led to Data Loss

March 27, 2014 by Vladimir Milanovic

Data loss in Ottawa.

In January of 2013 a data loss event occurred inside a Canadian federal government office involving the loss of private data of nearly half a million Canadians. A new report commissioned by interim privacy commissioner Chantal Bernier reveals that data was lost from a portable hard drive that was left unsecured for extended periods of time and lacked password protection and encryption.[read more]

exclusive

How Hackers Use SSL Strip to Obtain Secure Passwords [VIDEO]

March 24, 2014 by Christian Crank

How do hackers get your data?

It’s important to make sure your Web security is up-to-date. Remember, SSL Strip looks for HTTPS traffic and then redirects it to HTTP traffic, this is what makes it vulnerable. If the website is all HTTPS and not HTTP, SSL Strip cannot change the HTTPS link to a HTTP link.[read more]

exclusive

Protect Your Data From Backdoor Attacks [VIDEO]

March 21, 2014 by Christian Crank

Protect your data.

Imagine your computer system is a house. In your house you keep valuables such as TVs, jewelry, family heirlooms, and so on. In computer terms, think of these things as files and other data. In order to steal your valuables, crooks snoop for the weakest access point to your house, which is often the back door.[read more]

exclusive

How Microsoft is Protecting the Privacy of its Customers from the NSA

March 11, 2014 by Philip Cohen

Protecting privacy from the NSA.

Microsoft noted that when they update their software, they make the proper preparations to deal with "existing or future lawful demands", and that the company only provided data when the government demanded the data. The leak showed that not only did the NSA have direct access to Microsoft's services through the Prism program, but they also had access to Apple, Google, Facebook, and Yahoo.[read more]

exclusive

How to Crack SSH Logins to Get to Your Data [VIDEO]

February 24, 2014 by Christian Crank

How to crack SSH logins.

Your passwords aren't as strong as you think. Learn how hackers crack SSH logins to get to your data. The reality is this: if your computer is connected to the Internet, people will attempt to hack it. Across the ever-growing spectrum of hacking techniques, there is none more common than cracking passwords.[read more]

Privacy Threats You Need to Know About

February 19, 2014 by Ryan Fahey

Privacy threats.

As the Internet becomes more and more important to our lives, the challenge is to enjoy the conveniences of online activities while reducing the risks of privacy violations. A good understanding of the privacy threats is an important factor for preventing privacy violations.[read more]

exclusive

How to Steal Data by Enabling a Remote Desktop [VIDEO]

February 15, 2014 by Christian Crank

Steal data.

When it comes to stealing data, hackers can get especially creative. More often than not, hackers employ techniques that allow them to lift data without having to physically touch a target system or device. One way hackers like to do this is by enabling a remote desktop.[read more]

exclusive

How MapR’s M7 Platform Improves NoSQL and Hadoop

January 31, 2014 by Michele Nemschoff

MapR’s M7 platform.

M7 removes the trade-offs organizations typically face when looking to deploy a NoSQL solution. Here’s a look at how the M7 platform is making NoSQL and Hadoop easier, faster and more dependable. Since enterprises already have several disparate data systems, having the ability to unify NoSQL and Hadoop under a single scalable cluster eliminates data silos and provides administrative simplicity.[read more]

exclusive

Now Lawyers Can Use the Cloud, Too

January 10, 2014 by Andre Bourque
3

A lawyer using the cloud.

I was having lunch recently with an attorney friend of mine and wanted to share a document with him. Since he already had Gmail, I suggested we just share it on Google Drive as it wasn’t sensitive data...turned out he'd never even heard of Google Drive. Storage may not be particularly glamorous, but it is what makes everything happen. And the latest cloud-on-premise, hybrid solutions can make lawyers and the like more productive with secure data.[read more]

exclusive

Is BYOD Stealing the Big Data Limelight?

December 18, 2013 by Rick Delgado

Since big data is something many businesses are unfamiliar with and are approaching cautiously, BYOD is drawing many businesses’ attention. BYOD is less of a technological innovation and more of a necessary response to a growing trend.[read more]

exclusive

Enterprise Data Trends to Watch for in 2014

December 13, 2013 by Philip Cohen

What are the enterprise data trends for 2014?

Since different departments and employees able to access enterprise data instantaneously, in-the-moment analyses of problems or new projects is easier, as is providing better and more specific customer service. Here are some enterprise data trend predictions for 2014.[read more]

How the Financial Services Industry Should Use Big Data to Regain Trust

December 12, 2013 by Mark van Rijmenam

regaining customer trust through big data / shutterstock

If there is any industry that can benefit from big data, it is the financial services industry. Of course the first use case that comes to mind is the ability to reduce risks, whether it be credit risk, default risk or liquidity risk. But there are many more possibilities.[read more]