Data Protection November 25, 2015 Big Data Opportunities Need Big Data Security 3 min read - The adoption of big data analytics is a rapidly growing trend. If you want to reap the benefits of these platforms, you need comprehensive data security.
Endpoint November 19, 2015 Simple Mobile Security Steps to Protect Health Information 3 min read - Mobile security strategies must be upgraded in order to keep protected health information secure across all access points and endpoints.
November 18, 2015 App Developers’ Use of Back-end Cloud Services Puts Sensitive Data at Risk 2 min read - App developers love using BaaS providers to store and host the data they collect from users, but researchers said it puts sensitive data in danger.
Data Protection November 18, 2015 Dream Apps or Database Security Nightmare? No Excuses for Lax NoSQL Security 3 min read - Don't let your NoSQL database security — or lack thereof — keep you up at night. Instead, work on securing your dream apps throughout development.
November 12, 2015 TalkTalk Hack Could Have a $53 Million Price Tag, Even if Few Customers Are Affected 2 min read - The latest TalkTalk hack could come with a hefty price tag for the Internet service provider — and major security implications for victims.
November 10, 2015 SAP Vulnerabilities Shaking HANA’s Tree, Could Lead to Data Breach 2 min read - A new set of SAP HANA vulnerabilities could put corporate data at risk of severe, remote attacks and possible data breach if left unpatched.
Advanced Threats November 9, 2015 Cybercriminals Phish Their Way Into Customer Loyalty Programs 3 min read - Loyalty programs can bring big rewards to customers, but they also may make organizations more appealing to cybercriminals looking to steal data.
November 4, 2015 Gold Standard? Security Startup Earns $35 Million From Goldman Sachs 2 min read - Security startup iboss just received $35 million in Series A funding from Goldman Sachs — can their anomaly detection offering help Sachs stay relevant?
Cloud Security November 3, 2015 Cloud Has Torn Down the Firewalls: Can You Protect Your Cloud Data? 3 min read - As clients embrace cloud environments, firewalls come down and new types of users start accessing cloud data, introducing additional security challenges.
Data Protection November 2, 2015 From Compliance to Breaches: Managing Data Source Vulnerabilities Is a Big Challenge 3 min read - IBM Security Guardium Vulnerability Assessment can help solve a twofold problem faced by many enterprises: managing compliance and securing data.