Sign up | Login with →

Security

Wave of Cloud Security Concerns After Another Celebrity Leak

September 1, 2014 by Natalie Lehrer

Cloud security concerns.

Posters on 4chan and Reddit are claiming that the celebrities were hacked through Apple’s iCloud platform, but this has yet to be verified. Though Apple does not exactly offer the highest security protocol, with end to end 128-bit AES encryptions, the inclusion of videos to the ransom makes the weaknesses of iCloud as the only culprit highly improbable.[read more]

exclusive

Should the Entire Internet Be Encrypted?

August 19, 2014 by Shawn Gordon

Encrypt all the things!

Until the entire Internet is encrypting all its traffic, solutions like IceBrowser are a good way to protect yourself online. This isn’t about things as mundane as pornography; this is about protecting every piece of information and every footprint you leave out there.[read more]

How Consumers Foot the Bill for Data Breaches

August 9, 2014 by Matthew Zajechowski

Data.

Whether data breaches happen to individuals, companies or whole government organizations, they are rarely if ever cheap to deal with or in any way funny. In all of these cases, somebody is going to end up paying for the costs of a breach and usually that person is the end user or consumer of a given company’s products.[read more]

exclusive

If You Think Data Security is IT’s Responsibility, Think Again

July 23, 2014 by Tamara Dull
1

The Big Data MOPS Series.

What does Ebay, Living Social and Adobe have in common? These companies, among countless others, have all experienced a significant data breach in the last year. While these breaches have cost millions of dollars to fix, they’ve also cost some executives their jobs. If you don’t think data security is important, especially in this new age of big data, think again.[read more]

exclusive

Businesses Learn the Hard Way When It Comes to Cyber Attacks

July 15, 2014 by Christian Crank

Cyber attacks.

When it comes to how businesses are approaching cyber security, most know what to do in the event of a cyber incident, defending against phishing and social engineering attacks is priority, and concern over company web facing applications is high, according to a recent survey by TrainACE, a cyber security training organization.[read more]

exclusive

4 Things You Should Know About Operation Clandestine Fox

July 10, 2014 by Philip Cohen

Operation Clandestine Fox.

At the end of April, computer security firm FireEye discovered a flaw in the Microsoft web browser Internet Explorer. If hackers are able to exploit this flaw, which the security firm has dubbed Operation Clandestine Fox, it could lead to the entire computer being compromised.[read more]

exclusive

Cryptography Is Fun, But Your Business Calls for Encryption

June 8, 2014 by Tim Maliyil

Encryption.

With massive data breaches occurring on a more regular basis, your business needs to rely on the best technology to secure information. Your customers will thank you if you choose the most sophisticated encryption you can afford to protect your data.[read more]

exclusive

BYOD Disasters to Avoid [SLIDESHARE]

June 4, 2014 by Rick Delgado

BYOD disasters.

Many companies are working to implement new Bring Your Own Device (BYOD) programs in their organizations. The benefits are many, from increased productivity and satisfaction from employees to lower costs for businesses. With BYOD, however, comes notable concerns and potential pitfalls that some companies have already experienced.[read more]

Smartphones and the Rise of Contextual Apps

June 1, 2014 by Jared Howe

The rise of contextual apps.

If you are familiar with where technology is heading, you know that the future belongs to smartphones. More and more, people are using their smartphone to do almost everything. So it’s no surprise that mobile apps are exploding in popularity. According to Gartner analysts, users downloaded 102 billion apps last year alone. That’s a staggering number.[read more]

exclusive

MDM Industry Becoming New Standard for IT

May 30, 2014 by Jessica Oaks

Mobile device management.

As more businesses implement a bring your own device (BYOD) policy, companies are turning to mobile device management (MDM) to maintain and secure company data. MDM is now becoming an industry standard for IT. MDM is a strategy that uses software to manage, monitor, secure and support mobile devices used by employees.[read more]

eBay’s Data Breach Exposes 145 Million User Records

May 30, 2014 by Jared Howe

eBay data breach.

In what is one of the largest data breaches in history, eBay has gone public with the news that they have been the victims of a data breach that resulted in 145 million customer records being exposed. As a result of the breach, eBay has posted a message on their front page urging all customers to change their passwords.[read more]

exclusive

Protecting Privacy: Is a Big Data Marketplace the Answer?

May 29, 2014 by Gil Allouche

Privacy and big data.

Big data may not be completely understood by everyone, and there are certainly things that remain unclear about it’s purpose. That being said, big data is here to stay. The fact that it’s being utilized, especially with big data in the cloud services, by so many businesses, big and small, governments and schools, illustrate that it’s not going away and that’s a good thing.[read more]

exclusive

Ramifications of IT Infrastructure Everywhere

May 20, 2014 by Paul Barsch

Risky Business column.

Most people don’t notice that information technology pervades our daily lives. Some IT infrastructure is in the open and easy to spot, however plenty of IT infrastructures are nearly invisible as they reside in locked network rooms or heavily guarded data centers. Let's take off the covers of this often invisible underpinning and examine just a few ramifications of IT infrastructure everywhere.[read more]

Cyber Security: How to Cover Your SaaS

May 5, 2014 by Ryan Ward

How to cover your SaaS.

While attending various conferences, roundtables and other information security gatherings, a common theme that often presents itself is the concern over security of software-as-a-service (SaaS) vendors. Another common theme seems to be that IT cyber security teams are either very confident with how they are managing this particular "cloud" risk or they are completely baffled at how to discover and deal with the risk.[read more]

Attention Retailers: How to Avoid Being Attacked

April 28, 2014 by Ryan Fahey

Are your computer systems secure?

This past January, Michaels became aware of a large number of customers reporting that credit cards they’ve used at the retailer were incurring fraudulent charges. Michaels CEO Chuck Rubin announced that they were conducting an investigation.[read more]