How Virtualization Can Improve Security
Virtualization can do a lot for a company. It can increase a business’s efficiency, doing more work with less equipment.…
How to Create Users in Oracle BI (OBIEE) and WebLogic Tutorial
This short guide will take you through the process of creating new users in Oracle OBIEE and WebLogic as well…
How to Keep Your iCloud Account Safe From Hackers
Since hackers leaked nude photos of more than 100 celebrities from their phones to the Internet, people have been concerned…
The Societal Shift of Self Driving Cars
We are currently approaching a cross roads in transportation that we really haven’t seen since the transition from the horse…
Who Is Paying the Bill for Data Breaches? [INFOGRAPHIC]
Data breaches have become a common thing of today unfortunately. Many companies that store massive amounts of credit cards, passwords…
Wave of Cloud Security Concerns After Another Celebrity Leak
The publishing of nude pictures of celebrities over the internet is by no means a new phenomenon, more often than…
Should the Entire Internet Be Encrypted?
I recently wrote a piece about the Heartbleed vulnerability in OpenSSL that affected the security of about two thirds of…
How Consumers Foot the Bill for Data Breaches
Whether data breaches happen to individuals, companies or whole government organizations, they are rarely if ever cheap to deal with…
If You Think Data Security is IT’s Responsibility, Think Again
What does Ebay, Living Social and Adobe have in common? These companies, among countless others, have all experienced a significant…
Businesses Learn the Hard Way When It Comes to Cyber Attacks
When it comes to how businesses are approaching cyber security, most know what to do in the event of a…