Tag "Information security"

5 Trends That Will Drive Big Data in 2016

Big data, the cloud, mobile technology and IT security continued to grab the lion’s share of technology headlines in 2015, and IT and data leaders can expect more of the

7 Tips From The FBI To Prepare Your Firm For A Cyber Attack

“In the past, the FBI wanted to operate in the shadows, but today’s Bureau is very different” said Jay F. Kramer, Supervisory Special Agent, Federal Bureau of Investigation, Cyber Division,

Trust the Cloud, They Said. It’ll Be Safe, They Said.

Speaking recently in a Google webcast, U.S. CIO Tony Scott declared major cloud providers like Google, Amazon or Microsoft just as secure as the world’s largest financial institutions. He even

Cloud Access Security Broker (CASB). What Do They Do & Who Needs One?

The term Cloud Access Security Broker (or CASB), also known as cloud security gateway provider, sounds a lot like an individual who’s going to staunchly mediate the relationship between your

How to earn the trust of millennials concerned with security

Part of a great marketing strategy includes building trust with consumers, especially with influential groups like millennials. You might also call them Generation Y or digital natives, but whatever you

Cyber Attacks: 5 Ways Small Businesses Can Protect Themselves

Cyber attacks. We’re all hearing about them; we read about them daily and many of us have experienced them. Every day, they become a starker reality for all businesses and

5 Reasons Why Host-Based Intrusion Detection Systems Thrives in the Cloud

The threat landscape continues to expand as both the frequency and the financial impact of cyber security incidents increase. As a result, traditional host-based security evolves to counter new attack

Public, Private, Hybrid? Which Cloud is Right for your Company?

Should your company move data or applications to the private or public cloud or a hybrid combination of the two? But those aren’t the only options. Other choices include a

Changing the whistleblower-retaliation culture

If you’ve spent any time reading or watching the news this year, you’ve heard about at least one major data breach. Not only do those headline-grabbing events damage the company’s

Introducing the total cost of service-risk management (TCS-R)

Leading IT enterprises are migrating to all sorts of service-based digital business technologies, such as cloud, social media, Internet of Things (IoT), mobile, and xaaS. For many organizations, there are

  • 1
  • 2