Sign up | Login with →

Security

exclusive

The Harmful Side of Big Data: Identity Theft

October 29, 2014 by Anand Srinivasan

Identity theft.

Big data presents a huge opportunity for cyber criminals to get access to millions of records with lesser effort. So how does one protect themselves from a big data breach?[read more]

How Virtualization Can Improve Security

October 18, 2014 by MIKE20 Governance Association

Security.

Virtualization can do a lot for a company. It can increase a business’s efficiency, doing more work with less equipment. Virtualization can also save on costs, particularly when it comes to cooling down servers and getting things back up and running after a technical disaster.[read more]

exclusive

How to Create Users in Oracle BI (OBIEE) and WebLogic Tutorial

October 15, 2014 by Julie Johnson

Oracle BI.

This short guide will take you through the process of creating new users in Oracle OBIEE and WebLogic as well as introducing security concepts including the use of security groups and application roles to control data access.[read more]

How to Keep Your iCloud Account Safe From Hackers

October 11, 2014 by Rick Delgado

Safe iCloud.

Since hackers leaked nude photos of more than 100 celebrities from their phones to the Internet, people have been concerned about the security of the iCloud service, where the photos were stored. Fortunately, there are steps you can take to avoid becoming the victim of a similar attack.[read more]

exclusive

The Societal Shift of Self Driving Cars

September 18, 2014 by Shawn Gordon

Self driving cars.

We are currently approaching a cross roads in transportation that we really haven’t seen since the transition from the horse drawn carriage to the internal combustion engine automobile. Namely, the self driving car. Google, quietly and with no fanfare, until announcing in August 2012 that they had logged over 300,000 miles of accident free autonomous driving.[read more]

Who Is Paying the Bill for Data Breaches? [INFOGRAPHIC]

September 3, 2014 by Mark van Rijmenam

The bill for data breaches.

Recently we saw the biggest data breach ever, when over a billion account credentials where hacked from over 420.000 websites. Some 1.2 billion username and password combinations and 542 million unique email accounts were stolen according to the New York Times.[read more]

Wave of Cloud Security Concerns After Another Celebrity Leak

September 1, 2014 by Natalie Lehrer

Cloud security concerns.

Posters on 4chan and Reddit are claiming that the celebrities were hacked through Apple’s iCloud platform, but this has yet to be verified. Though Apple does not exactly offer the highest security protocol, with end to end 128-bit AES encryptions, the inclusion of videos to the ransom makes the weaknesses of iCloud as the only culprit highly improbable.[read more]

exclusive

Should the Entire Internet Be Encrypted?

August 19, 2014 by Shawn Gordon

Encrypt all the things!

Until the entire Internet is encrypting all its traffic, solutions like IceBrowser are a good way to protect yourself online. This isn’t about things as mundane as pornography; this is about protecting every piece of information and every footprint you leave out there.[read more]

How Consumers Foot the Bill for Data Breaches

August 9, 2014 by Matthew Zajechowski

Data.

Whether data breaches happen to individuals, companies or whole government organizations, they are rarely if ever cheap to deal with or in any way funny. In all of these cases, somebody is going to end up paying for the costs of a breach and usually that person is the end user or consumer of a given company’s products.[read more]

exclusive

If You Think Data Security is IT’s Responsibility, Think Again

July 23, 2014 by Tamara Dull
1

The Big Data MOPS Series.

What does Ebay, Living Social and Adobe have in common? These companies, among countless others, have all experienced a significant data breach in the last year. While these breaches have cost millions of dollars to fix, they’ve also cost some executives their jobs. If you don’t think data security is important, especially in this new age of big data, think again.[read more]

exclusive

Businesses Learn the Hard Way When It Comes to Cyber Attacks

July 15, 2014 by Christian Crank

Cyber attacks.

When it comes to how businesses are approaching cyber security, most know what to do in the event of a cyber incident, defending against phishing and social engineering attacks is priority, and concern over company web facing applications is high, according to a recent survey by TrainACE, a cyber security training organization.[read more]

exclusive

4 Things You Should Know About Operation Clandestine Fox

July 10, 2014 by Philip Cohen

Operation Clandestine Fox.

At the end of April, computer security firm FireEye discovered a flaw in the Microsoft web browser Internet Explorer. If hackers are able to exploit this flaw, which the security firm has dubbed Operation Clandestine Fox, it could lead to the entire computer being compromised.[read more]

exclusive

Cryptography Is Fun, But Your Business Calls for Encryption

June 8, 2014 by Tim Maliyil

Encryption.

With massive data breaches occurring on a more regular basis, your business needs to rely on the best technology to secure information. Your customers will thank you if you choose the most sophisticated encryption you can afford to protect your data.[read more]

exclusive

BYOD Disasters to Avoid [SLIDESHARE]

June 4, 2014 by Rick Delgado

BYOD disasters.

Many companies are working to implement new Bring Your Own Device (BYOD) programs in their organizations. The benefits are many, from increased productivity and satisfaction from employees to lower costs for businesses. With BYOD, however, comes notable concerns and potential pitfalls that some companies have already experienced.[read more]

Smartphones and the Rise of Contextual Apps

June 1, 2014 by Jared Howe

The rise of contextual apps.

If you are familiar with where technology is heading, you know that the future belongs to smartphones. More and more, people are using their smartphone to do almost everything. So it’s no surprise that mobile apps are exploding in popularity. According to Gartner analysts, users downloaded 102 billion apps last year alone. That’s a staggering number.[read more]

 

type != 'infographic') ) { ?>