Sign up | Login with →

Security

exclusive

Protecting Your Business from Shellshock

November 19, 2014 by Rick Delgado

Shellshock

Shellshock is a bug that affects the UNIX-based shell, found commonly in Linux and Apple operating systems. The vulnerability allows attackers to remotely execute code on these machines, leading to data theft, malware injection and server hijacking. Here are a few ways to protect yourself.[read more]

exclusive

Warning! When Big Data Turns Bad

November 18, 2014 by Bernard Marr

As with all game-changing technologies, Big Data has the potential to be used for evil, as well as good. There are two common ways that “bad things” will often happen: malice, or maladministration. Sometimes big data technology is misused to deliberately cause harm to others, and sometimes it is simply used incorrectly, therefore causing harm.[read more]

Self-Healing Virtual Machines Coming to Datacenter Near You?

November 18, 2014 by Natalie Lehrer

One of the more exciting inventions in data center technology has been developed by a team of computer scientists from the University of Utah. The invention is being called A3 which is short for Advanced Adaptive Applications. When unusual activity is detected, A3 tries to automatically repair the code infraction.[read more]

exclusive

What Every Business Owner Needs to Know About Data Sovereignty

November 16, 2014 by Ajay Patel

Protecting your data

Lately data protection has become the number one concern for business owners. However, if you want full data protection, you should understand what’s behind data sovereignty. From knowing up-to-date laws and regulations to understanding cloud technology, you can ensure data privacy for your business and your customers.[read more]

Meeting the Business Technology Needs of Midsized Companies

November 14, 2014 by Julie Hunt

Current technology trends are important for all organizations. Most midsized companies have these technologies at the top of their lists: Mobile, Analytics, Cloud, and Security. And each year many midsized organizations dedicate more budget for technology as a strategic investment, as Deloitte noted in a recent study.[read more]

The Complex Process of Keeping Access Governance Software Simple

November 1, 2014 by Ryan Ward

Keep it simple.

With the rapid growth of the access governance software market, you would think that access certification issues would be a thing of the past. Unfortunately, most solutions are missing the boat because they are either cumbersome to use or they are niche solutions that do not integrate with target systems or a core identity and access management solution.[read more]

exclusive

The Harmful Side of Big Data: Identity Theft

October 29, 2014 by Anand Srinivasan

Identity theft.

Big data presents a huge opportunity for cyber criminals to get access to millions of records with lesser effort. So how does one protect themselves from a big data breach?[read more]

How Virtualization Can Improve Security

October 18, 2014 by MIKE20 Governance Association

Security.

Virtualization can do a lot for a company. It can increase a business’s efficiency, doing more work with less equipment. Virtualization can also save on costs, particularly when it comes to cooling down servers and getting things back up and running after a technical disaster.[read more]

exclusive

How to Create Users in Oracle BI (OBIEE) and WebLogic Tutorial

October 15, 2014 by Julie Johnson

Oracle BI.

This short guide will take you through the process of creating new users in Oracle OBIEE and WebLogic as well as introducing security concepts including the use of security groups and application roles to control data access.[read more]

How to Keep Your iCloud Account Safe From Hackers

October 11, 2014 by Rick Delgado

Safe iCloud.

Since hackers leaked nude photos of more than 100 celebrities from their phones to the Internet, people have been concerned about the security of the iCloud service, where the photos were stored. Fortunately, there are steps you can take to avoid becoming the victim of a similar attack.[read more]

exclusive

The Societal Shift of Self Driving Cars

September 18, 2014 by Shawn Gordon

Self driving cars.

We are currently approaching a cross roads in transportation that we really haven’t seen since the transition from the horse drawn carriage to the internal combustion engine automobile. Namely, the self driving car. Google, quietly and with no fanfare, until announcing in August 2012 that they had logged over 300,000 miles of accident free autonomous driving.[read more]

Who Is Paying the Bill for Data Breaches? [INFOGRAPHIC]

September 3, 2014 by Mark van Rijmenam

The bill for data breaches.

Recently we saw the biggest data breach ever, when over a billion account credentials where hacked from over 420.000 websites. Some 1.2 billion username and password combinations and 542 million unique email accounts were stolen according to the New York Times.[read more]

Wave of Cloud Security Concerns After Another Celebrity Leak

September 1, 2014 by Natalie Lehrer

Cloud security concerns.

Posters on 4chan and Reddit are claiming that the celebrities were hacked through Apple’s iCloud platform, but this has yet to be verified. Though Apple does not exactly offer the highest security protocol, with end to end 128-bit AES encryptions, the inclusion of videos to the ransom makes the weaknesses of iCloud as the only culprit highly improbable.[read more]

exclusive

Should the Entire Internet Be Encrypted?

August 19, 2014 by Shawn Gordon

Encrypt all the things!

Until the entire Internet is encrypting all its traffic, solutions like IceBrowser are a good way to protect yourself online. This isn’t about things as mundane as pornography; this is about protecting every piece of information and every footprint you leave out there.[read more]

How Consumers Foot the Bill for Data Breaches

August 9, 2014 by Matthew Zajechowski

Data.

Whether data breaches happen to individuals, companies or whole government organizations, they are rarely if ever cheap to deal with or in any way funny. In all of these cases, somebody is going to end up paying for the costs of a breach and usually that person is the end user or consumer of a given company’s products.[read more]