Security

Articles

Six Steps to Surviving Your First Breach

Once you accept that everything that can go wrong will do so at the worst possible time, there are things that can be done today to help rein in the trials of the future. More >

A Serious Look at Third-Party Security

In so many of the high-profile breaches we’ve seen over the past 18 months, a third-party security breakdown has been, at least partially, to blame. More >

WhatsApp Surge Spotlights Need to Address BYOD Security

IT departments need to educate users about the security and privacy risks such apps raise, and provide them with a secure, enterprise-ready alternative. More >

More Options for Multi-Tenant Clouds

By earmarking shared infrastructure to key data processes, the cloud becomes more attuned to the needs of the enterprise it serves. More >

Can We Trust the Security of Mobile Payment Solutions?

Mobile payment options from Apple, Google and others each have their strengths, but users are slow on the uptake. Security and other concerns are to blame. More >

Eight Steps for Mastering Information Mapping

Did you know that 60 percent of records and information management professionals say their lack of an information map is an issue? More >

More Articles >

Interviews

IAPP’s New Privacy Certification Addresses Emerging Landscape

New privacy threats and concerns have created the opportunity for IT professionals to fill a crucial role within the organization. A new cert addresses the need.

More >

Making VDI More Secure

Don't ignore these potentially serious vulnerabilities.

More >

Data at Home and in the Cloud

Cloud means that an enterprise must trust a service provider to provide controls at a physical and infrastructure layer, but logical controls can remain the same.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice
Related IT Downloads

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...

Security44 Assessing Security and Privacy Controls in Federal Information Systems and Organizations

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...

Misc43 Guidelines for Smart Grid Cybersecurity

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date