Data Security

Securing your data and network, inside and outside the perimeter

You Should Never Ignore IT Security Warnings

22 Sep, 2014

The attacks on businesses are getting more creative, which means that companies need to be more vigilant about security than ever before. ...More >

The Rise of Retail Breaches

18 Sep, 2014

You have to be living under a rock to not notice that retail breaches are happening with alarming frequency. ...More >

Android Browser Bug Puts Privacy at Risk

17 Sep, 2014

The old Android AOSP browser contains a bug that can be exploited, so users with Jelly Bean-based devices should be aware. ...More >

Saks Incident Highlights Real Risks of Insider Threats

15 Sep, 2014

The Saks insider breach is a wakeup call that we have to worry just as much about the inside as we do about watching for attacks from the outside. ...More >

Hiding Malware in Short-Life Websites

11 Sep, 2014

A whopping 71 percent of Web host names, approximately 470 million out of 660 million unique names, are only meant to last for 24 hours. This is by design. ...More >

The Many Layers of the iCloud Hack

08 Sep, 2014

Experts across the security industry say multiple failures in strategy led to this breach, and Apple isn't doing enough. ...More >

Why Businesses Should Pay Attention to the Home Depot Breach

04 Sep, 2014

If you run a business where credit and debit cards are used as a form of payment, you should care about the Home Depot breach for several reasons. ...More >

Questions Surround Presumed Dairy Queen Data Breach

01 Sep, 2014

Rumblings of a Dairy Queen data breach reveal the tricky relationship among franchises, parent companies and network security. ...More >

J.P. Morgan Admits Network Breach Despite Claims of Layered Security

28 Aug, 2014

No matter how many layers of defense, IT security knows the hackers are going to get in one way or another. It is a matter of catching them quicker. ...More >

How Security Experts View the Current State of Information Security

27 Aug, 2014

A survey at the Black Hat Security conference reveals what areas IT security experts find are most neglected in the enterprise. ...More >

Pages:   1 23Next »  Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data