Tag Archives: data breach

Coke’s Internal Data Breach – Lessons Learned

Coke’s Internal Data Breach – Lessons Learned

Last Friday, Coke announced that sensitive information belonging to roughly 70,000 current and former North American employees was compromised because the data hadn’t been encrypted on company laptops (despite their company encryption policy.)1 The data breach occurred after a former worker stole several company laptops that locally stored employee information, such as social security and…

Cloud Infographic: Risky Data

Cloud Infographic: Risky Data

Cloud Infographic: Risky Data Regulatory compliance and risk of a data breach are forcing financial institutions to implement more stringent policies and procedures. With the cost of a security breach far outweighing the cost of a solution, the benefits of Single Sign-On (SSO) and strong authentication are too significant to pass up. If you are…

Trend Micro Predicts Cyber Security Concerns For 2014 And Beyond

Trend Micro Predicts Cyber Security Concerns For 2014 And Beyond

Trend Micro Predicts Cyber Security Concerns for 2014 and Beyond Mobile threats, targeted attacks and vulnerabilities for the Internet of Everything highlighted DALLAS, Dec. 9, 2013 – Trend Micro Incorporated (TYO: 4704; TSE: 4704) today released its annual security predictions report, “Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond.” The outlook cites that one major…

Understanding Twitter’s Security Enhancements

Understanding Twitter’s Security Enhancements

Understanding Twitter’s Security Enhancements Last week Twitter announced a significant security enhancement – enablement of forward secrecy on twitter.com, api.twitter.com, and mobile.twitter.com domains. The prime objective of this change is to deprive hackers of an important exploitation tool. Why was this necessary? In the past 18 months, Twitter, akin to many other social network companies,…

Security Considerations While Moving To The Cloud

Security Considerations While Moving To The Cloud

Security Considerations While Moving To The Cloud It is always difficult to maintain in-house IT operations at the cutting edge of efficiency. Whether it is a question of getting enough budgets approved or keeping all stakeholders happy, life for technical managers is never easy. On the other hand, clouds have certain inherent advantages. Big cost…

5 Reasons Why The Cloud Is Still Not 100% Secure

5 Reasons Why The Cloud Is Still Not 100% Secure

5 Reasons Why The Cloud Is Still Not 100% Secure In the last year, many big cloud companies have come under cyber attacks leading to outages and data losses Cloud companies offer tremendous trade-offs to businesses in terms of flexibility of scale, better security, reduced manpower and maintenance cost. The majority of organizations and individuals…

What PCI DSS 3.0 Means For Cloud Service Providers

What PCI DSS 3.0 Means For Cloud Service Providers

What PCI DSS 3.0 Means For Cloud Service Providers The only constant is change. Earlier this month, the Payment Card Industry Security Standards Council released version 3.0 of the PCI DSS standard (along with the accompany Payment Application Data Security Standard).  In it are a few key focus areas that will directly affect Cloud Service…

Featured Writers

Top Viral Impact

The Rise Of The iPro: How Cloudware Has Helped To Develop A Responsive Business Generation

The Rise Of The iPro: How Cloudware Has Helped To Develop A Responsive Business Generation

The Rise Of The iPro Overview: Independent professionals are playing a more important role in business by the day, but how much has the introduction and adoption of cloudware helped to develop a generation of workers that are working more flexibly and efficiently than ever before? iPros, or ‘independent professionals’, are becoming increasingly common in…

Self-Service BI (Business Intelligence) 101

Self-Service BI (Business Intelligence) 101

BI (Business Intelligence) 101 Non-technical users are increasingly jumping at the opportunity to get real-time business insight from data without the help of the IT department, whether they’re a small business without an IT staff altogether, or a high-ranking executive unwilling to request a report that will take a week to be completed. What is…

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges Every December, security experts begin to release their predictions on what cybersecurity will look like in the coming year. “The concept behind predictions is based on a company’s ability to express its expertise in a field both on the business and on the technology end,” said Barry Shteiman, director of security strategy…

The Role Cloud Technology Plays in the Recruiting Industry

The Role Cloud Technology Plays in the Recruiting Industry

The Recruiting Industry Like most other established industries, the recruiting industry is being disrupted by new business models and cutting-edge technologies. From recruiting technology talent with a highly publicized hackathon, to handling graphic or even online versions or resumes, recruiting agencies are seeing new challenges and opportunities every day. Yet, the goal is still the…

Cloud and regulation in financial services

Cloud and regulation in financial services

Cloud Regulation When talking about cloud and regulation in financial services, it is important to approach it with a clear understanding of the typical policies that your national regulator will require you to adhere to. Let’s start with outsourcing policy. Cloud mode provides us with a way of outsourcing data centre environments, applications, and services…

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,…

Advertising Programs

Click To Find Out More!!

Sponsored Posts

Sponsored Posts

Advertising Package Options 2015 We have a dedicated readership, through our online, social media and email presence. Our goal is to continue to build our growing community, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more. In order to do so, we require the support from businesses looking to generate more…