Big data projects can lose steam once the reality replaces the buzz. Here are some ways to keep it on track and sustain the enthusiasm. More>>
Author: admin
Seven Steps Toward Better Small Business Security
Symantec's 2013 Internet Security Threat Report found that 31 percent of all targeted attacks in the previous year were aimed at businesses with fewer than 250 employees. More>>
Six ways consumerization leads to data leaks
Solix Technologies Announces ILM Assessment for Data Growth Health Check
Back to the future: Fleeting data storage technologies
4 Tips for Destroying Sensitive Data
As businesses continue reel under data loss and theft, destroying sensitive information in a timely manner is imperative for risk mitigation and continued operational security. There are various techniques for destroying sensitive data that will safeguard personally identifiable information (PII), payment card industry (PCI) transaction data, and proprietary secrets. Principal
7 Shortcuts to Losing Your Data (and Probably Your Job)
This tongue in cheek white paper explores data loss from a contrarian point of view - exploring the top seven shortcuts you can take to ensure that you lose your data. More>>
How to Stop the In-House Data Thief
Ponemon Institute Releases Research Findings on Digital Defense Security Training
NSA’s big data efforts need transparency, privacy advocates say
The increasing uses of big data in all kinds of organizations, particularly surveillance agencies, should prompt a debate about legitimate data collection and practices, said several speakers at a Washington, D.C., big data and privacy forum hosted by the Future of Privacy Forum and the Stanford Law School Center for

