Data Security

Securing your data and network, inside and outside the perimeter

How Security Experts View the Current State of Information Security

27 Aug, 2014

A survey at the Black Hat Security conference reveals what areas IT security experts find are most neglected in the enterprise. ...More >

Gartner: Companies Are Spending More on Security

25 Aug, 2014

Business leaders recognize the need to increase security budgets, but must be sure to apply the extra money to the areas that will do the most good. ...More >

Tis the Season for University Malware Attacks

21 Aug, 2014

Security issues on colleges tend to get swept under the media carpet, but the potential rewards for hackers are immense. ...More >

Community Health Breach Highlights Security Problems in Health Care Industry

20 Aug, 2014

Community Health Systems, a Tennessee-based health care organization, reported that 4.5 million records were compromised this spring. ...More >

Most Companies Admit They Don’t Have a Very Effective Security Response Plan

18 Aug, 2014

Lack of time and lack of budget are top reasons a huge percentage of U.S. company don't have a cybersecurity plan. But the costs of that could be disastrous. ...More >

The Need for a Layered Authentication Approach

14 Aug, 2014

Layered authentication, perhaps with real-time data or a three-factor approach, seems to be a necessity. ...More >

Consumers Believe Privacy Is Responsibility of Website Owners

11 Aug, 2014

Several recent studies show that online privacy worries differ by age and generation. But who is ultimately responsible for privacy? ...More >

With a Breach This Large, Time Is on Your Side

07 Aug, 2014

News of the breach of over a billion personal records should be a nudge to smarter behavior, but there is no need to panic. ...More >

New Malware Hides in Windows Registry

04 Aug, 2014

This new configuration of malware shows that we can’t depend solely on AV software to find and block malware on our computers. ...More >

Department of Homeland Security Takes Further Steps to Strengthen Cybersecurity

31 Jul, 2014

The House of Representatives has passed legislation to strengthen the Department of Homeland Security’s efforts to protect critical infrastructure. ...More >

Pages:   1 23Next »  Last

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data