Discover how micro-segmentation, delivered through network virtualization, provides comprehensive data center security, accelerates delivery time, and enhances the agility of your data center. Download the eBook here.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX...
In the wake of the Hillary Clinton email controversy, organizations need to be more aware of the risks of unsanctioned "shadow IT" and take appropriate mitigation steps, says security expert Mac McMillan.
Whatever your favorite metaphor may be - mountain, tsunami, landslide, or avalanche - it's an inarguable fact that we live in a world that is creating and storing more data than most of us can imagine. From presentations and emails, to videos and photos, to documents of every type, we create 2.5 exabytes of data every...
Unstructured data may be the world's best-kept secret. Companies have been slow
to recognize that valuable information lies within the documents, emails, and social streams
that are being constantly created. The value of structured data continues to grow, of course -
but the new battleground for competitive...
It's a challenging time to be an IT professional these days. While data has become more valuable as companies are looking for ways to harness the intelligence within, the explosive growth in the amount of data stored has a downside. Many organizations are experiencing a seemingly endless- and escalating- threat to the...
Federal investigators announced five more arrests this week in connection with a $45 million ATM cash-out and prepaid card fraud scheme. Learn why experts expect these types of crimes to become even more common.
FS-ISAC has issued a white paper with tips on streamlining third-party software risk assessments. One member of a new working group explains why the adoption of standard security controls is so critical.
Are you considering a secure, managed file transfer solution to address the security of information and data transferred to, from and inside your organization?
This in-depth white paper shares best practices, checklists and worksheets in evaluating solutions such as:
Conducting an Evaluation;
The guidance discusses methods, techniques and best practices for the sanitization of target data on different media types and risk-based approaches organizations can apply to establish and maintain a media sanitization program.
The massive growth of data within today's enterprise overwhelms traditional security controls. How can organizations inventory, manage and secure Big Data at every stage of its lifecycle? How can they turn the security challenge into a security advantage? Join this panel of experts for a discussion of Big Data and...
Everyone is talking about big data. But Zions Bancorp is actually doing something with it - using data to enhance fraud detection and account monitoring. Aaron Caldiero offers tips for how banks can derive maximum value from big data.
FTC settlement agreements in two cases involving data exposed on peer-to-peer networks offer a reminder of the risks involved in using the networks. Social Security numbers, healthcare information and other personal details were exposed.
The online dating website eHarmony has warned a "small fraction" of its users of a June 6 breach that likely exposed hashed passwords. Whether the incident is related to a LinkedIn breach has not been confirmed.