Security

Articles

Small Businesses Encouraged to ‘Take the Pledge’ to Get Educated on Cybersecurity

Small business evangelist Ramon Ray and Norton encourage SMBs to improve their cybersecurity efforts for 2015. More >

Rising Apple Catches Slumping Samsung

News this week included 100G Metro, IoT security, the Obama administration on data usage, Apple vs. Samsung and Microsoft's HoloLens innovations. More >

Top Seven Priorities for IT in 2015

Seven critical considerations for IT professionals who are looking to optimize their operations in 2015 to ensure a secure and efficient enterprise. More >

The Ongoing Trouble with Passwords

It's not just the bad passwords, it's the reuse of the same passwords that makes networks vulnerable. More >

IBM Tests Identity Mixer Encryption Service to Secure Data

With IBM's new encryption technology, users will have a set of encrypted credentials that are verified by Identity Mixer without needing to provide address or credit card info. More >

Make National Data Privacy Day a Priority

National Data Privacy Day is meant to encourage better privacy and security practices when using our multitudes of devices. More >

More Articles >

Interviews

IAPP’s New Privacy Certification Addresses Emerging Landscape

New privacy threats and concerns have created the opportunity for IT professionals to fill a crucial role within the organization. A new cert addresses the need.

More >

Making VDI More Secure

Don't ignore these potentially serious vulnerabilities.

More >

Data at Home and in the Cloud

Cloud means that an enterprise must trust a service provider to provide controls at a physical and infrastructure layer, but logical controls can remain the same.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice
Related IT Downloads

DataM25 Guidelines for Media Sanitization

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...

Security44 Assessing Security and Privacy Controls in Federal Information Systems and Organizations

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...

Misc43 Guidelines for Smart Grid Cybersecurity

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...

Money3 PCI Compliance: The Definitive Guide

In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization mus...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date