<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Life &#187; Slideshows</title>
	<atom:link href="https://www.informationlife.net/category/slideshows/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.informationlife.net</link>
	<description>The latest Information Lifecycle Management (ILM) updates</description>
	<lastBuildDate>Wed, 30 Mar 2016 11:17:49 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.17</generator>
	<item>
		<title>18 essential Hadoop tools for crunching big data</title>
		<link>https://www.informationlife.net/18-essential-hadoop-tools-crunching-big-data/</link>
		<comments>https://www.informationlife.net/18-essential-hadoop-tools-crunching-big-data/#comments</comments>
		<pubDate>Tue, 06 Jan 2015 06:37:45 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=5069</guid>
		<description><![CDATA[<p>Hadoop has grown to stand for so much more than a smallish stack of code for spreading work to a group of computers. This core proved to be so useful that a large collection of projects now orbits around it. Some offer data housekeeping, others monitor progress, and some deliver sophisticated data storage. The Hadoop...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/18-essential-hadoop-tools-crunching-big-data/">18 essential Hadoop tools for crunching big data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2015/01/18-essential-Hadoop-tools-for-crunching-big-data.jpg"><img class="alignleft  wp-image-4988"  src="http://www.informationlife.net/wp-content/uploads/2015/01/18-essential-Hadoop-tools-for-crunching-big-data.jpg" alt="" width="314" height="237" /></a>Hadoop has grown to stand for so much more than a smallish stack of code for spreading work to a group of computers. This core proved to be so useful that a large collection of projects now orbits around it. Some offer data housekeeping, others monitor progress, and some deliver sophisticated data storage.</p>
<p>The Hadoop community is fast evolving to include businesses that offer support, rent time on managed clusters, build sophisticated enhancements to the open source core, or add their own tools to the mix.<a href="http://www.infoworld.com/article/2606340/hadoop/131105-18-essential-Hadoop-tools-for-crunching-big-data.html">More&gt;&gt;</a></p>
<p>(Source: infoworld.com)</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/18-essential-hadoop-tools-crunching-big-data/">18 essential Hadoop tools for crunching big data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/18-essential-hadoop-tools-crunching-big-data/feed/</wfw:commentRss>
		<slash:comments>15</slash:comments>
		</item>
		<item>
		<title>10 critical security habits you should be doing</title>
		<link>https://www.informationlife.net/10-critical-security-habits/</link>
		<comments>https://www.informationlife.net/10-critical-security-habits/#comments</comments>
		<pubDate>Tue, 18 Nov 2014 06:45:51 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=5052</guid>
		<description><![CDATA[<p>Batten down the hatches It&#8217;s a tough, insecure world out there, fellow PC faithful. Times have never been scarier, with website data breaches turning into regular affairs, programming flaws like Heartbleed popping up left and right, and botnets like Gameover Zeus infecting a legion of PCs, only to gobble the up personal information and financial...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/10-critical-security-habits/">10 critical security habits you should be doing</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2014/11/10-critical-security-habits-you-should-be-doing.png"><img class="alignleft  wp-image-4988"  src="http://www.informationlife.net/wp-content/uploads/2014/11/10-critical-security-habits-you-should-be-doing.png" alt="" width="314" height="237" /></a>Batten down the hatches It&#8217;s a tough, insecure world out there, fellow PC faithful. Times have never been scarier, with website data breaches turning into regular affairs, programming flaws like Heartbleed popping up left and right, and botnets like Gameover Zeus infecting a legion of PCs, only to gobble the up personal information and financial data stored within.</p>
<p>Good news: There&#8217;s a lot that regular PC users can do to protect themselves against the worst of the worst. But bad news: Most of us don’t bother.<br />
Giving your digital life a thorough security overhaul is easier than you&#8217;d think. Here are 10 critical security measures you should be doing right now—go ahead, do it!<a href="http://www.cio.com.au/slideshow/548908/pictures-10-critical-security-habits-should-doing-aren-t/?image=1">More&gt;&gt;</a></p>
<p>(Source: cio.com.au)</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/10-critical-security-habits/">10 critical security habits you should be doing</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/10-critical-security-habits/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>Big Data Plus IoT: Opportunities Too Big to Ignore</title>
		<link>https://www.informationlife.net/big-data-plus-iot-opportunities-big-ignore/</link>
		<comments>https://www.informationlife.net/big-data-plus-iot-opportunities-big-ignore/#comments</comments>
		<pubDate>Tue, 18 Nov 2014 05:35:15 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=5049</guid>
		<description><![CDATA[<p>Companies are invested heavily in big data but often need help from outside organizations, according to a new study conducted by Accenture and GE. The study, based on a survey of 250 business and IT executives at organizations with revenue of more than $150 million, found that 73 percent already allocate a substantial amount of...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/big-data-plus-iot-opportunities-big-ignore/">Big Data Plus IoT: Opportunities Too Big to Ignore</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2014/11/Big-Data-Plus-IoT-Opportunities-Too-Big-to-Ignore.png"><img class="alignleft  wp-image-4988"  src="http://www.informationlife.net/wp-content/uploads/2014/11/Big-Data-Plus-IoT-Opportunities-Too-Big-to-Ignore.png" alt="" width="314" height="237" /></a>Companies are invested heavily in big data but often need help from outside organizations, according to a new study conducted by Accenture and GE. The study, based on a survey of 250 business and IT executives at organizations with revenue of more than $150 million, found that 73 percent already allocate a substantial amount of their IT budgets to big data.</p>
<p>Those investments are set to increase in the coming year as companies leverage the data they have to improve profitability and market share. From a solutions provider perspective, the most compelling aspect of those investments is that more than half the respondents said they will look outside their organizations for big data help.<a href="http://www.channelinsider.com/tech-analysis/slideshows/big-data-plus-iot-opportunities-too-big-to-ignore.html">More&gt;&gt;</a></p>
<p>(Source: channelinsider.com)</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/big-data-plus-iot-opportunities-big-ignore/">Big Data Plus IoT: Opportunities Too Big to Ignore</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/big-data-plus-iot-opportunities-big-ignore/feed/</wfw:commentRss>
		<slash:comments>7</slash:comments>
		</item>
		<item>
		<title>10 Powerful Facts About Big Data</title>
		<link>https://www.informationlife.net/10-powerful-facts-big-data/</link>
		<comments>https://www.informationlife.net/10-powerful-facts-big-data/#comments</comments>
		<pubDate>Tue, 18 Nov 2014 05:10:43 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=5046</guid>
		<description><![CDATA[<p>Big data, however you define it, has been praised and vilified. It&#8217;s many things to many people: a boon to scientists and retailers, but also an enabling technology for a host of privacy and security threats. Whether savior or scam &#8212; or maybe even a mixture of the two &#8212; big data remains a popular...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/10-powerful-facts-big-data/">10 Powerful Facts About Big Data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2014/11/Big-Data-1st-slide.png"><img class="alignleft  wp-image-4988"  src="http://www.informationlife.net/wp-content/uploads/2014/11/Big-Data-1st-slide.png" alt="" width="314" height="237" /></a>Big data, however you define it, has been praised and vilified. It&#8217;s many things to many people: a boon to scientists and retailers, but also an enabling technology for a host of privacy and security threats.</p>
<p>Whether savior or scam &#8212; or maybe even a mixture of the two &#8212; big data remains a popular topic among pundits, prognosticators, marketers, and security buffs. Its unofficial definition is evolving as well. So what is it? Wikipedia&#8217;s description is a good start: &#8220;any collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications.&#8221; <a href="http://www.informationweek.com/big-data/big-data-analytics/10-powerful-facts-about-big-data/d/d-id/1269522">More&gt;&gt;</a></p>
<p>(Source: informationweek.com)</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/10-powerful-facts-big-data/">10 Powerful Facts About Big Data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/10-powerful-facts-big-data/feed/</wfw:commentRss>
		<slash:comments>7</slash:comments>
		</item>
		<item>
		<title>12 Biggest Data Breaches of the Last 12 Months</title>
		<link>https://www.informationlife.net/12-biggest-data-breaches-last-12-months/</link>
		<comments>https://www.informationlife.net/12-biggest-data-breaches-last-12-months/#comments</comments>
		<pubDate>Wed, 02 Apr 2014 11:18:00 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>
		<category><![CDATA[Data Breach]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4987</guid>
		<description><![CDATA[<p>Many companies have felt the effects of data theft over the last several years. It&#8217;s 2014 and it doesn&#8217;t look like the going is getting any easier. The technology sector seems most at risk with every week bringing the world another reported data breach. Recent security breaches prove that regardless of the technology you have...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/12-biggest-data-breaches-last-12-months/">12 Biggest Data Breaches of the Last 12 Months</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2014/04/slide_image_Biggest_Data_Breaches.jpg"><img class="alignleft  wp-image-4988"  src="http://www.informationlife.net/wp-content/uploads/2014/04/slide_image_Biggest_Data_Breaches.jpg" alt="" width="314" height="237" /></a>Many companies have felt the effects of data theft over the last several years. It&#8217;s 2014 and it doesn&#8217;t look like the going is getting any easier. The technology sector seems most at risk with every week bringing the world another reported data breach.</p>
<p>Recent security breaches prove that regardless of the technology you have in place, if you are targeted by cyber-attackers &#8212; whether through social engineering, a phishing attack or an employee opening a malicious file on the company network &#8212; they will penetrate your defenses and steal whatever data they choose. Smart organizations are evolving their approach from a perimeter defense to a more a multi-layered, risk-based security approach, but in the meantime it seems as if most organizations are vulnerable.</p>
<p>Here we look at the largest breaches in the last year. <a href="http://www.networkworld.com/slideshow/146920/12-biggest-data-breaches-of-the-last-12-months.html#slide2">More&gt;&gt;</a></p>
<p>(Source: networkedworld.com)</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/12-biggest-data-breaches-last-12-months/">12 Biggest Data Breaches of the Last 12 Months</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/12-biggest-data-breaches-last-12-months/feed/</wfw:commentRss>
		<slash:comments>12</slash:comments>
		</item>
		<item>
		<title>Data storage &#8212; then and now</title>
		<link>https://www.informationlife.net/data-storage-now/</link>
		<comments>https://www.informationlife.net/data-storage-now/#comments</comments>
		<pubDate>Mon, 17 Mar 2014 10:06:08 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>
		<category><![CDATA[Data Storage]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4942</guid>
		<description><![CDATA[<p>This year, the amount of data will grow to 2.16 zettabytes worldwide, according to IDC. By 2016, it will have grown to 3.77 zettabytes. As remarkable as we are at creating data, storage technology has kept up. Data storage is the fastest growing semiconductor technology. Tape storage, hard disk drives and solid state storage have...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/data-storage-now/">Data storage &#8212; then and now</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2014/03/data-storage-then-now.png"><img class="alignleft  wp-image-4943"  src="http://www.informationlife.net/wp-content/uploads/2014/03/data-storage-then-now.png" alt="" width="220" height="166" /></a>This year, the amount of data will grow to 2.16 zettabytes worldwide, according to IDC. By 2016, it will have grown to 3.77 zettabytes. As remarkable as we are at creating data, storage technology has kept up.</p>
<p>Data storage is the fastest growing semiconductor technology. Tape storage, hard disk drives and solid state storage have doubled about every 12 to 18 months.</p>
<p>Desktop drives today come in storage capacities of as much as 4TB (5TB later this year). That&#8217;s enough to hold 1 million photos or 562 hours of HD video. By 2020, Seagate said heat-assisted magnetic recording will lead to <a href="http://bit.ly/1lCPzP9" target="_blank">a 60TB desktop hard drive</a>, enough storage for 12 million photos or 6,750 hours of HD video.</p>
<p>As the size of storage drives shrink, capacity increases &#8212; dramatically. Here is a look at how data storage has changed over the last six decades. <a href="http://www.computerworld.com/slideshow/detail/143723/Data-storage----then-and-now#slide2">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/data-storage-now/">Data storage &#8212; then and now</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/data-storage-now/feed/</wfw:commentRss>
		<slash:comments>8</slash:comments>
		</item>
		<item>
		<title>10 Big Data Myths Enterprises Must Come to Terms With</title>
		<link>https://www.informationlife.net/10-big-data-myths-enterprises-must-come-terms-with/</link>
		<comments>https://www.informationlife.net/10-big-data-myths-enterprises-must-come-terms-with/#comments</comments>
		<pubDate>Tue, 24 Dec 2013 06:46:17 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>
		<category><![CDATA[Big Data]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4856</guid>
		<description><![CDATA[<p>The worldwide enterprise software market, growing at a 4 to 5 percent rate year over year, reached a total market size of $342 billion in 2012, according to IDC&#8217;s Worldwide Semiannual Software Tracker. This huge market, which may edge close to $375 billion this year, is being driven largely by the growth of big data...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/10-big-data-myths-enterprises-must-come-terms-with/">10 Big Data Myths Enterprises Must Come to Terms With</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2013/12/048413bigdatamythstitle.jpg"><img class="alignleft size-thumbnail wp-image-4857"  src="http://www.informationlife.net/wp-content/uploads/2013/12/048413bigdatamythstitle-150x150.jpg" alt="" width="150" height="150" /></a>The worldwide enterprise software market, growing at a 4 to 5 percent rate year over year, reached a total market size of $342 billion in 2012, according to IDC&#8217;s Worldwide Semiannual Software Tracker. This huge market, which may edge close to $375 billion this year, is being driven largely by the growth of big data collection and processing.  With more and more consumer activity leaving some kind of digital footprint, enterprises are jumping at the notion of deriving insight from the mountains of customer kilobytes. Naturally, with every buzz topic like this comes speculation and assumption, and big data is no different. Check out the slideshow which presents the big data &#8220;myths&#8221; and corresponding. <a href="http://www.eweek.com/enterprise-apps/slideshows/10-big-data-myths-enterprises-must-come-to-terms-with.html/">More&gt;&gt;</a></p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/10-big-data-myths-enterprises-must-come-terms-with/">10 Big Data Myths Enterprises Must Come to Terms With</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/10-big-data-myths-enterprises-must-come-terms-with/feed/</wfw:commentRss>
		<slash:comments>11</slash:comments>
		</item>
		<item>
		<title>Cloud Computing: From its Early Years to its Current State</title>
		<link>https://www.informationlife.net/cloud-computing-from-early-years-current-state/</link>
		<comments>https://www.informationlife.net/cloud-computing-from-early-years-current-state/#comments</comments>
		<pubDate>Fri, 08 Nov 2013 12:04:50 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4756</guid>
		<description><![CDATA[<p>What exactly is the state of cloud computing here in late 2013, and what does the future hold? In this slide show, eWEEK, with input from cloud management and disaster-recovery specialist Egenera and a host of other experts, presents the following key data points about the current state of cloud computing. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/cloud-computing-from-early-years-current-state/">Cloud Computing: From its Early Years to its Current State</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>What exactly is the state of cloud computing here in late 2013, and what does the future hold? In this slide show, eWEEK, with input from cloud management and disaster-recovery specialist Egenera and a host of other experts, presents the following key data points about the current state of cloud computing. <a href="http://www.eweek.com/cloud/slideshows/cloud-computing-from-its-early-years-to-its-current-state.html/">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/cloud-computing-from-early-years-current-state/">Cloud Computing: From its Early Years to its Current State</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/cloud-computing-from-early-years-current-state/feed/</wfw:commentRss>
		<slash:comments>9</slash:comments>
		</item>
		<item>
		<title>Stunning Maps Help Visualize Complex Data</title>
		<link>https://www.informationlife.net/stunning-maps-help-visualize-complex-data/</link>
		<comments>https://www.informationlife.net/stunning-maps-help-visualize-complex-data/#comments</comments>
		<pubDate>Mon, 02 Sep 2013 11:48:20 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4568</guid>
		<description><![CDATA[<p>You must have come across the slick, super-informative interactive map synthesizing big data. But did you ever wonder how all this happened? Tanya Buckingham, assistant director of University of Wisconsin’s Cartography Lab, says the spark happened about seven years ago, when online mapping was &#8220;hacked,&#8221; and anyone could start making &#8220;mash-ups&#8221; &#8212; that is, combining...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/stunning-maps-help-visualize-complex-data/">Stunning Maps Help Visualize Complex Data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2013/09/6-stunning-maps.jpg"><img class="alignleft size-thumbnail wp-image-4572"  src="http://www.informationlife.net/wp-content/uploads/2013/09/6-stunning-maps-150x150.jpg" alt="Stunning Maps Help Visualize Complex Data" width="150" height="150" /></a>You must have come across the slick, super-informative interactive map synthesizing big data. But did you ever wonder how all this happened?</p>
<p>Tanya Buckingham, assistant director of University of Wisconsin’s Cartography Lab, says the spark happened about seven years ago, when online mapping was &#8220;hacked,&#8221; and anyone could start making &#8220;mash-ups&#8221; &#8212; that is, combining data with an Internet-based map. When application programming interfaces (APIs) became available, virtually anyone could customize an online map. From there, the wave spread.</p>
<p>From contradictions in the Bible to NYC income inequality, 170 years of hurricane to racial roadmap, here are a handful of interactive maps to put your feet back on solid ground. <a href="http://news.discovery.com/tech/apps/stunning-maps-visualize-complex-data-130831.htm">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/stunning-maps-help-visualize-complex-data/">Stunning Maps Help Visualize Complex Data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/stunning-maps-help-visualize-complex-data/feed/</wfw:commentRss>
		<slash:comments>12</slash:comments>
		</item>
		<item>
		<title>Top 6 Threats to Enterprise Security</title>
		<link>https://www.informationlife.net/top-6-threats-enterprise-security/</link>
		<comments>https://www.informationlife.net/top-6-threats-enterprise-security/#comments</comments>
		<pubDate>Fri, 30 Aug 2013 07:29:46 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4548</guid>
		<description><![CDATA[<p>With “cyber espionage” making headlines, enterprises are buttering their security taking a closer look at threats that can impact their business and ultimately their bottom line. McAfee Labs has analyzed the threats of the past quarter for emerging trends, which center on mobile and overall malware. With BYOD becoming common across many enterprises, threats that...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/top-6-threats-enterprise-security/">Top 6 Threats to Enterprise Security</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2013/08/Top-6-Threats-to-Enterprise-Security.jpg"><img class="alignleft  wp-image-4550"  src="http://www.informationlife.net/wp-content/uploads/2013/08/Top-6-Threats-to-Enterprise-Security-150x150.jpg" alt="Top 6 Threats to Enterprise Security" width="135" height="135" /></a>With “cyber espionage” making headlines, enterprises are buttering their security taking a closer look at threats that can impact their business and ultimately their bottom line. McAfee Labs has analyzed the threats of the past quarter for emerging trends, which center on mobile and overall malware.</p>
<p>With BYOD becoming common across many enterprises, threats that once considered consumer problems are now becoming issues for the enterprise as well. Targeted Trojans, Mobile Spyware, Ransomware, Phishing, Database Breaches, and Browser-based Threats seem to be the top six threats to enterprise security. <a href="http://www.information-management.com/resource-center/?id=10024811">More&gt;&gt;</a></p>
<p><em>Image courtesy of David Castillo Dominici at <a href="http://www.freedigitalphotos.net/" target="_blank">FreeDigitalPhotos.net</a></em></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/top-6-threats-enterprise-security/">Top 6 Threats to Enterprise Security</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/top-6-threats-enterprise-security/feed/</wfw:commentRss>
		<slash:comments>9</slash:comments>
		</item>
	</channel>
</rss>
