Learn why the question of who's responsible for specific areas of security in the cloud is still a common enterprise cloud service unknown. More>>
Author: admin
How to avoid online identity theft
Though online identity theft can be a disaster, there are things you can do to minimize the chance of it happening. More>>
Big Data: It’s about the quality, not the quantity
If you’re in the practice of collecting big data, here’s some food for thought: even the highest level data analysts and scientists have not come to one succinct conclusion on the definition of the phrase “big data.” More>>
Exorcising the Big Data “Demons” in Marketing and Sales
New Study Connects Data Breaches to Alarmingly High Rates of Identity Theft
Phishing 2.0: Why phishing is back as the No. 1 web threat
This whitepaper discusses a major new threat vector - "phishing 2.0." It explores how a new generation of sophisticated phishing attacks now target businesses. More>>
IT security braces itself for ‘perfect storm’
Cloud computing: the hype risks obscuring the true business benefits
Organizations should be looking towards hybrid IT solutions and tailoring their cloud use to best suit the needs of their business, whether this is done alone or through a managed services technology partner. More>>


