dcsimg

Security

Articles

IBC Banks on AI for Security

The IBC Bank, the 79th largest in the United States, focuses on Texas and Oklahoma, and uses BluVector security to find malware and compromised data in emails and other files. More >

BlackBerry and the Importance of Securing the IoT Future

The priorities at BlackBerry around securing the elements of the IoT should be our priorities, as well. More >

Why Aren’t the Data Privacy Laws We Have Now Enough?

Experts disagree about whether the U.S. needs a federal data privacy law to replace the patchwork that now exists. More >

Should the U.S. Have a Federal Data Privacy Law?

U.S. data privacy laws are scattershot among individual states and, like state-based data breach notification laws, only add more confusion. Having a national law would provide the same protections to everyone. More >

Boosting Productivity Without Sacrificing Security

Productivity software is turning into a vulnerability for the enterprise as hackers find new ways to worm their way into sensitive data infrastructure. More >

Tech Companies Preparing Framework for Federal Data Privacy Legislation

Many of the largest tech and communication companies will be meeting with Congress to discuss data privacy and to present ideas for federal data privacy regulations. More >

More Articles >

Interviews

CEO Shares Insights on Preventing Data Loss, Handling Data Breaches

Datacastle CEO Ron Faith discusses mitigating the risk around employees walking out the door with sensitive company data.

More >

Citrix CSO: Treating IT Security Symptoms Is the Problem, Not the Solution

Stan Black, chief security officer at Citrix Systems, says companies need to be focused on data analytics, machine learning, and an understanding of individuals’ roles.

More >

‘Security Operations Center’ Approach Is Fail-Safe Against Cyberattacks, CEO Says

A key line of defense will take the form of “security operations centers,” or SOCs. And with SMBs expected to be targeted more aggressively by the bad guys, making the SOC approach affordable is going to be essential.

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series uses 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Editor's Choice

Productivity Suites Are Getting Smarter

The newest wave of productivity suite solutions appears poised to launch another generational shift in the business world in the form of intelligent processes and smart digital assistants.

 More >

Apple Adds Mandatory Privacy Policy to the App Store

Univa Survey Finds Wide Chasm for AI to Cross

GDPR Compliance Is Lagging. What Can American Legislation Learn?

The Best New-Collar Job: A Mainframe Technician?

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs...

Security95-290x195.jpg Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships....

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.