You are here
Home > Articles (Page 18)

The Future of Data Security

Imagine a library whose doors are locked every night. But one night, a burglar manages to sneak in. All the books and manuscripts are gone, right? What if it can’t happen in this library? What if the books themselves are locked down, and the ones the robber does manage to

Mac security: How to protect your data, and stay malware free

In the past few years, there's been increasing interest in malware targeting Apple Macintosh users. Fake antivirus programs like Mac Defender, and its variants, were spotted about five years ago. Just last year, Mac users were quaking in their boots after the Flashback Trojan appeared to have a huge infection base.

Samsung gets serious about data security with KNOX

The word “Knox” usually brings up images of Fort Knox — that impenetrable fortress of solitude that has served as the Department of the Treasury’s Bullion Depository. So, naming an app that’s sole purpose is to secure data from prying eyes is apropos. Once you understand the specific purpose of

Data Management Standards are a Barrier

While standards can help control costs and reduce complexity, in an age where data management architecture needs to flex and meet the business need for agility, standards are a barrier. The emphasis on standards is what keeps IT in a mode of constant foundation building, playing the role of deli

Google shares national security data

Articles

Google started sharing information about how often the government asks for access to its data for national security purposes, a move the company views as a step forward for transparency. More>>

IT trends: Gartner’s 2013 predictions for information management

Gartner has identified the top technology trends that will play key roles in modernizing information management and infrastructure in 2013. Big data, modern information infrastructure, semantic technologies, the logical data warehouse, NoSQL DBMSs, in-memory computing are some of the top technology trends impacting information infrastructure in 2013. More>>

Defense Science Board Warns Of ‘Existential Cyber Attack’

When former Defense Secretary Leon Panetta warned of a cyber-attack equivalent to Pearl Harbor, he appears to have understated the threat. Reports from the Department of Defense' Defense Science Board bluntly tells the Pentagon that it's incredibly ill-prepared to handle a full scale cyber assault. More>>

How Apple’s iWatch could revolutionize mobile security

Apple has filed 79 patents that relate to wearable technology and are generally expected to be part of its iWatch effort. Reports also indicate that the company has a team of 100 people working on the iWatch project that includes engineers, design experts, and marketing professionals. The iWatch could be used as

As hacking against US rises, experts try to pin down motive

When Telvent, a company that monitors more than half the oil and gas pipelines in North America, discovered that the Chinese had hacked into its computer systems, it immediately shut down remote access to its clients’ systems. Company officials and American intelligence agencies then grappled with a fundamental question: Why had

11 Things to know about the Chinese hacking scandal

While some of us wonder about the future and imagine what it would be like if written by our favorite authors, the more cautious and knowledgeable warn against living in the worlds of Clive Barker, Jeff Noon, and Stephen King. And there are others who argue about the dangers of

Top