Are you doing enough to secure your organization's sensitive information? If all your security measures are focused on the volume level rather than the file or document level, chances are the answer is 'no.'
Thor Olavsrud |
03 Aug |
Read more
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data analytics technologies to mine the data in their logs and improve their security footing.
Thor Olavsrud |
31 Jul |
Read more
The number of serious vulnerabilities in applications declined in 2011, but they are still common. Improving your application security posture requires determining whether you're a target of opportunity or a target of choice and understanding your development lifecycle.
Thor Olavsrud |
24 Jul |
Read more
IT organisations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem.
Thor Olavsrud |
17 Jul |
Read more
The demand for information security professionals, which already high, will surge in the next few years. Finding trained security professionals to meet the demand will be challenging, but businesses can ease the burden by training developers to write more secure code.
Thor Olavsrud |
06 Jul |
Read more
How do your Websites stack up when it comes to consumer security and privacy protections? On the whole, when it comes to security and privacy best practices, social media sites are leading the way, while sites operated by banks and the U.S. government are lagging.
Thor Olavsrud |
26 Jun |
Read more
Many companies are pursuing Big Data with the ultimate aim of better understanding and selling to their customers.
Thor Olavsrud |
18 Jun |
Read more
It's an oft-repeated mantra: Organizations engaged in or investigating cloud computing in any of its many flavors are concerned about security. In fact, concerns about security, data privacy and data residency are often cited as inhibitors to cloud adoption. But are the concerns justified? Some security experts say visibility and control are the missing elements.
Thor Olavsrud |
18 Feb |
Read more
Criminals in 2012 are increasingly targeting the accounts of business owners and executives as a way to facilitate financial fraud and CIOs can help protect their organizations against these attacks.
Thor Olavsrud |
17 Feb |
Read more