Security. Cloud. Two words that are almost always together but rarely happily. Read on to learn why that isn’t the case and what you need to known about securing your critical infrastructure in the cloud.
Mobile operations management (MOM) is one of the top priorities of today’s modern enterprise. While the first generation of MOM solutions evolved around the management of mobile devices and applications, organizations have quickly realized that an effective enterprise mobile infrastructure requires addressing a more difficult challenge: managing and securing mobile business data.
Approximately 60% of all computers sold worldwide today are portable. Portable computers are taken everywhere, making them an easy target for criminals, especially for the private data they contain. Even a failed hard drive that you send back to your vendor for warranty is a potentially at risk. How can your personal data be protected? With one word - encryption!
With the news stories of possible data breaches at enterprises like Target, and companies migrating to cloud environments, CIOs have been asking hard questions about cloud security. 2
In this article, authors discuss the role of big data and Hadoop in security analytics space and how to use MapReduce to process data for security analysis.
Software piracy emerged in the 1980s and has since spread beyond the software industry. Today software products are becoming more susceptible to incidences of code tampering, not just outright theft.
This article we focuses on the database backup tools and security policies when deploying MongoDB NoSQL databases. Cloud backup with MongoDB Management Service (MMS) is covered. 2
Tracking projects is challenging when enterprises adopt agile in product development. Smaller work items and lower work in process improves risk management and supports agile execution and learning. 3
What’s the best way to protect servers in the cloud? To find out, InfoQ spoke with Mark Nunnikhoven, a Principal Engineer in the Cloud & Emerging Technologies division at Trend Micro.
Eric Sampson shares the industry trends and security state within the payment card industry as discussed during the PCI Security Standards Council community meeting recently held in Las Vegas.
Dennis Sosnoski explains how supposedly-secure connections can be downgraded to the point where they are easily broken and how to make it more difficult for anyone to see or alter your data exchanges. 2
As Hadoop becomes more popular a platform for data processing, there are more concerns about its security concerns and the insider threats of malicious users in a Hadoop cluster. 2