A new survey reveals that enterprises are rushing to employ cloud applications and mobile devices for mission-critical operations, but most do not have the proper controls in place to prevent data breaches, fraud, and other threats. More>>
Articles
Data Scientist: The Sexiest Job No One Has
2013 was the year of deliberate data breaches: Sophos
2013 demonstrated how data breaches now come in “new flavours” and that big companies are not the only ones losing customer records. More>>
Study: Privilege management policies unaltered after Snowden leaks
Computer Security Day: why you should care
Every year since 1988, Computer Security Day has asked us to take a look at how we protect our data online. But messing with other people’s information goes back a long way before that—a long way before computers, in fact. What’s regarded as the first hack actually happened 110 years
Avoid identity theft and other crimes: Ten tips for safe Cyber Monday shopping
Top 10 tech trends for 2014: IEEE Computer Society
The year 2014 will mark transition from hype to maturity and broader adoption of many promising technologies, such as mobile cloud services, Big Data analytics, Internet of Things, 3D printing, and MOOCs. More>>
Top 5 security tips to protect your small business
A Beginner’s Guide to Cloud Storage Encryption
Defining ‘Big Data’ is Often a Big Challenge
John Mashey, a former chief scientist for high-end computer maker Silicon Graphics (SGI), might have been the first to use the Big Data label in 1994. He did it to explain to companies the importance of using SGI's hardware to handle their growing amounts of bits and bytes. More>>