March 10, 2015 Study: Banking ID Theft Losses Decline Despite New Data Breaches 2 min read - According to a recent study, even though banking ID theft is on the rise, the number of banking customers victimized and the total cost are down.
Mainframe March 9, 2015 The Absence of Evidence Is Not the Evidence of Absence 3 min read - Large corporations tend to have a lack of data or evidence. By completing their data set, they can gain insight into their systems and protect themselves.
Data Protection March 6, 2015 Big Data Requires Big Protection 3 min read - Big data management presents complex challenges, and enterprises need real-time monitoring and alerting to track what is happening and what may happen.
March 5, 2015 Publicly Stored Security Key May Have Enabled Uber Data Breach 2 min read - A recent data breach at Uber may have been enabled by a security key stored on a public GitHub page, according to a lawsuit filed by Uber.
Data Protection March 4, 2015 Data Security: How Vulnerable Is Your Critical Data? 2 min read - Data security today requires a holistic approach that caters to customer concerns and leverages cloud, mobile, social and big data with confidence.
Intelligence & Analytics March 3, 2015 Cyber Forensics: From Dark Arts to Common Practice 2 min read - Organizations' security teams can use cyber forensics to better respond to increasingly sophisticated and advanced security threats.
Cloud Security February 26, 2015 Has Your Cloud Security Become a Juggling Act? 3 min read - Cloud security is what prevents many businesses from making the leap and adopting the cloud to manage their data and protect their information
Application Security February 26, 2015 Software Asset Management: Why It Makes Security Sense 2 min read - How does software asset management (SAM) relate to keeping your data secure? As cybersecurity escalates, so does your software management responsibility.
Data Protection February 20, 2015 Data Security Goes Beyond Technology 2 min read - Today's critical business data is under constant threat, which is why enterprises must apply adequate data protection for their data security measures.
Endpoint February 6, 2015 Securing Devices, Data and Users: Unified Endpoint Management at IBM InterConnect 2015 2 min read - In the face of quickly evolving technology and increased cybercriminal threats, organizations need to consider using an endpoint management solution.