An organization’s ability to innovate is only as good as its ability to integrate, access and analyze the data. This paper discusses achieving collaboration and input from both IT and business users. More>>
Author: admin
Top 10 Hacking Countries
When it comes to computer-attack traffic, China deserves the bulk of the blame, but not all of it. Ten countries including China accounted for three-quarters of the world's cyber-assault traffic during the last quarter of 2012, according to Akamai Technologies, which helps companies speed the delivery of online content. While detecting the
One in five data breaches are the result of cyberespionage, Verizon says
Why BYOD costs more than you think: An FAQ
Choosing Security Products: DLP Technology
Data leakage can be simply defined as the accidental or intentional exposure of sensitive information. To counter this ever-present threat, data loss prevention (DLP) products have become a critical technology to many enterprises. Even though many purchases are driven by regulatory compliance or the desire to avoid negative ramifications associated
How businesses can safeguard the security of their data
Employees accessing multi devices—such as laptops, tablets, mobile phones—are making it difficult to safeguard their confidential information. The staff at the BBC had £750,000 worth of gadgets lost or stolen since 2010. This highlights the growing `data security’ issue many companies are facing. While the cost of replacing these expensive
The Human Side of Big Data
Pirate Bay Cofounder Indicted on Hacking Charges
Symantec report finds small businesses battered by cyber crime
Cyber criminals are increasingly targeting small businesses due to their less sophisticated defenses, according to a new report from Symantec. Symantec’s Internet Security Threat Report 2013 , released in April 2013 says that companies with 250 employees or less absorbed 18 percent of targeted cyber-attacks in 2011, but the figure jumped

