Approximately 60% of all computers sold worldwide today are portable. Portable computers are taken everywhere, making them an easy target for criminals, especially for the private data they contain. Even a failed hard drive that you send back to your vendor for warranty is a potentially at risk. How can your personal data be protected? With one word - encryption!
With the news stories of possible data breaches at enterprises like Target, and the current trend of companies migrating to cloud environments for the flexibility, scalability, agility, and cost-effectiveness they offer, CIOs have been asking hard questions about cloud security.
In this article, authors discuss the role of big data and Hadoop in security analytics space and how to use MapReduce to efficiently process data for security analysis for use cases like Security Information and Event Management (SIEM) and Fraud Detection.
Software piracy emerged in the 1980s and has since spread beyond the software industry. Today software products are becoming more susceptible to incidences of code tampering, not just outright theft.
This article we focuses on the database backup tools and security policies when deploying MongoDB NoSQL databases. Cloud backup with MongoDB Management Service (MMS) is covered. 1
Tracking projects is challenging when enterprises adopt agile in product development. Smaller work items and lower work in process improves risk management and supports agile execution and learning. 3
What’s the best way to protect servers in the cloud? To find out, InfoQ spoke with Mark Nunnikhoven, a Principal Engineer in the Cloud & Emerging Technologies division at Trend Micro.
Eric Sampson shares the industry trends and security state within the payment card industry as discussed during the PCI Security Standards Council community meeting recently held in Las Vegas.
Dennis Sosnoski explains how supposedly-secure connections can be downgraded to the point where they are easily broken and how to make it more difficult for anyone to see or alter your data exchanges. 2
As Hadoop becomes more popular a platform for data processing, there are more concerns about its security concerns and the insider threats of malicious users in a Hadoop cluster. 1
Web services offer distinct opportunities for real-time innovation, but requires new standards in the way APIs are secured and managed at the B2B enterprise gateway level.
The battle over security and performance is fought by security professionals and network administrators. These factions have to barter an uneasy truce for the organization to survive.