Data Security Topic Center
What you need to know about data security and protecting sensitive information
Microsoft has reached a settlement with domain provider No-IP to disable some of its domains, after taking control of part of its network to shut down a botnet.
IBM Softlayer opened a new London data centre yesterday, providing a local option for UK firms with data sovereignty concerns.
The Electronic Frontier Foundation, a prominent digital privacy rights group, has filed a lawsuit against the U.S. National Security Agency to get it to specify the extent to which it might exploit software security flaws.
Talk about big data and it won't take long for Hadoop to appear in the conversation. The Apache open source software is used to orchestrate clusters of commodity computers to crunch information from mountains of data.
Microsoft has backtracked on a plan to stop sending email-based notifications about security bulletins starting this month.
Google has launched a new site, CookieChoices.org, to help visitors of European sites learn more about the digital breadcrumbs they leave behind through cookies.
Microsoft has taken legal action to combat the spread of malware that the company says can be traced to bad actors in Kuwait and Algeria.
Google is developing its own version of OpenSSL that will be more appropriate for its own software products, which have been using the critical encryption component for years with customized patches.
A code-hosting and project management services provider was forced to shut down operations indefinitely after a hacker broke into its cloud infrastructure and deleted customer data, including most of the company's backups.
Breaking with other players in the IT industry, Amazon's CTO has downplayed any impact of the Edward Snowden revelations on its international business.
No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties -- outside vendors, contractors, affiliates, partners and others.
DevOps is all about collaboration between operations teams and development teams. And the increase in collaboration should help enterprises to become more agile, eliminate waste, and automate, while also creating a more reliable infrastructure. It's about rapidly iterating, continuously improving, and being more competitive.
The pace of change for Information Technology is challenging established notions of "What is IT?" and "What is Information Security in the modern age?" For one example, the "new" data center technologies such as virtualization, Software-Defined Networking (SDN), service-oriented delivery models, and cloud computing have radically changed the typical IT infrastructure from a defined set of assets owned and controlled by the organization to a constantly fluctuating roster of resources that can come and go from IT department visibility and control.
"In 2013, we estimated that the NAC market was 350 million dollars, which was an increase of about 55-percent over 2012," says Lawrence Orans, Research Vice President, Gartner, Inc. According to Orans, Gartner expects that growth to slow in 2014, with an estimated increase of 45-percent over 2013 numbers. Burgeoning enterprise BYOD concerns have been the major drivers in that growth, says Orans. NAC vendor ForeScout is integrating its capabilities with those of Invincea in order to further abate those concerns.
It is almost summertime, and while the livin' supposedly gets a bit easier, it remains risky. As the vacation season approaches and everybody is planning travel, socializing with friends and family and relaxing, people in the "always connected" world should add one more item to their list: Don't relax when it comes to online security.
Given the current prevalence of mobile devices, especially smartphones, it comes as no surprise that they are becoming more and more entwined with everyday aspects of our lives. We don't just use them to make calls, to text, or to browse the internet anymore. We can use them to do just about anything, and that includes using them as a means to provide our credentials.
There is no shame in being breached by a cyber attack -- security experts are unanimous about that. Prevention, while a worthy part of a risk management strategy, will never be 100% successful, given the sophistication and overwhelming volume of attacks.
The Fuss About Dark Wallet
The White House's big report on big-data privacy has several shortcomings.
An offshore coding vendor offers a great price for quality work, but it may be stealing the company's source code.
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction
- In this report, learn how one organization was able to use HP ArcSight ESM to reduce false positives by 90% and the time...
- 3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats
- This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it...
- Guard data in government environments by implementing continuous diagnostics and mitigation
- IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities. Read...
- Current Data Security Issues of NoSQL Databases
- No SQL databases, sometimes referred as Not¿Only¿SQL databases, have recently gained much attention and popularity because of their demonstrated high scalability and performance.
- Evaluating File Sync and Share Solutions: 12 Questions to Ask about Security
- File sync and share can increase productivity, but how do you pick a solution that works for you? Download to learn some important... All Data Security White Papers
- PST Archiving: What is it and How is it Done? Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10...
- HP DevOps KnowledgeVault This interactive resource focuses on the evolution taking place in the world of software development, specifically the Agile development framework, and the gap...
- Introducing Cloud-Based Disaster Recovery From VMware Cost-effectively protect your business applications in the case of a local disaster or disruptive event. VMware is excited to introduce vCloud Hybrid Service...
- Vblock™ Specialized System for SAP HANA® Deploy SAP HANA® fast and with low risk. VCE brings together all of the necessary components for SAP HANA® into a single, standardized...
- Why do you need an enterprise mobile platform? Today companies must offer great apps that run on a range of devices, and connect to an exploding set of backend data. Appcelerator...
- All Data Security Webcasts