Sign up | Login with →



If You Think Data Security is IT’s Responsibility, Think Again

July 23, 2014 by Tamara Dull

The Big Data MOPS Series.

What does Ebay, Living Social and Adobe have in common? These companies, among countless others, have all experienced a significant data breach in the last year. While these breaches have cost millions of dollars to fix, they’ve also cost some executives their jobs. If you don’t think data security is important, especially in this new age of big data, think again.[read more]


Businesses Learn the Hard Way When It Comes to Cyber Attacks

July 15, 2014 by Christian Crank

Cyber attacks.

When it comes to how businesses are approaching cyber security, most know what to do in the event of a cyber incident, defending against phishing and social engineering attacks is priority, and concern over company web facing applications is high, according to a recent survey by TrainACE, a cyber security training organization.[read more]


4 Things You Should Know About Operation Clandestine Fox

July 10, 2014 by Philip Cohen

Operation Clandestine Fox.

At the end of April, computer security firm FireEye discovered a flaw in the Microsoft web browser Internet Explorer. If hackers are able to exploit this flaw, which the security firm has dubbed Operation Clandestine Fox, it could lead to the entire computer being compromised.[read more]


Cryptography Is Fun, But Your Business Calls for Encryption

June 8, 2014 by Tim Maliyil


With massive data breaches occurring on a more regular basis, your business needs to rely on the best technology to secure information. Your customers will thank you if you choose the most sophisticated encryption you can afford to protect your data.[read more]


BYOD Disasters to Avoid [SLIDESHARE]

June 4, 2014 by Rick Delgado

BYOD disasters.

Many companies are working to implement new Bring Your Own Device (BYOD) programs in their organizations. The benefits are many, from increased productivity and satisfaction from employees to lower costs for businesses. With BYOD, however, comes notable concerns and potential pitfalls that some companies have already experienced.[read more]

Smartphones and the Rise of Contextual Apps

June 1, 2014 by Jared Howe

The rise of contextual apps.

If you are familiar with where technology is heading, you know that the future belongs to smartphones. More and more, people are using their smartphone to do almost everything. So it’s no surprise that mobile apps are exploding in popularity. According to Gartner analysts, users downloaded 102 billion apps last year alone. That’s a staggering number.[read more]


MDM Industry Becoming New Standard for IT

May 30, 2014 by Jessica Oaks

Mobile device management.

As more businesses implement a bring your own device (BYOD) policy, companies are turning to mobile device management (MDM) to maintain and secure company data. MDM is now becoming an industry standard for IT. MDM is a strategy that uses software to manage, monitor, secure and support mobile devices used by employees.[read more]

eBay’s Data Breach Exposes 145 Million User Records

May 30, 2014 by Jared Howe

eBay data breach.

In what is one of the largest data breaches in history, eBay has gone public with the news that they have been the victims of a data breach that resulted in 145 million customer records being exposed. As a result of the breach, eBay has posted a message on their front page urging all customers to change their passwords.[read more]


Protecting Privacy: Is a Big Data Marketplace the Answer?

May 29, 2014 by Gil Allouche

Privacy and big data.

Big data may not be completely understood by everyone, and there are certainly things that remain unclear about it’s purpose. That being said, big data is here to stay. The fact that it’s being utilized, especially with big data in the cloud services, by so many businesses, big and small, governments and schools, illustrate that it’s not going away and that’s a good thing.[read more]


Ramifications of IT Infrastructure Everywhere

May 20, 2014 by Paul Barsch

Risky Business column.

Most people don’t notice that information technology pervades our daily lives. Some IT infrastructure is in the open and easy to spot, however plenty of IT infrastructures are nearly invisible as they reside in locked network rooms or heavily guarded data centers. Let's take off the covers of this often invisible underpinning and examine just a few ramifications of IT infrastructure everywhere.[read more]

Cyber Security: How to Cover Your SaaS

May 5, 2014 by Ryan Ward

How to cover your SaaS.

While attending various conferences, roundtables and other information security gatherings, a common theme that often presents itself is the concern over security of software-as-a-service (SaaS) vendors. Another common theme seems to be that IT cyber security teams are either very confident with how they are managing this particular "cloud" risk or they are completely baffled at how to discover and deal with the risk.[read more]

Attention Retailers: How to Avoid Being Attacked

April 28, 2014 by Ryan Fahey

Are your computer systems secure?

This past January, Michaels became aware of a large number of customers reporting that credit cards they’ve used at the retailer were incurring fraudulent charges. Michaels CEO Chuck Rubin announced that they were conducting an investigation.[read more]

The Four IT Security Principles: A Practical Guide to Improving Information Security

April 27, 2014 by Ryan Ward

10 Commandments.

Every IT security leader has a laundry list of items that need to be fixed in an organization to improve information security and lower risk. Some of these issues may instill a certain fear or anxiety in you that prevents you from taking that first step.[read more]

Big Data Needs to Work Toward Security Solutions Now Before It’s Too Late

April 15, 2014 by Tracey Wallace

Big data and security solutions.

In the effort to protect data rights, transparency is key. What will you be doing with a user’s data? How might that change overtime? How will you alert users to data breaches (if it happens) or changes in your use policy? In protecting data rights, your users become an extension of your brand — and thus an asset to secure.[read more]


Top Apps and Programs to Protect Google Nexus Devices

April 15, 2014 by Jessica Oaks

Protect Google Nexus devices.

As people's computing and online habits migrate from desktop devices to mobile devices, so too goes the way of the hackers and online predators. Though you may feel unprepared to thwart such risks, there are actually a number of different apps and programs to help protect your smartphone.[read more]