Collaborative Economy – Customer Appreciation Day

customer-appreciation

Part 2 – Collaborative Economy – Customer Appreciation Day This is part 2 of a 2-part post on disruptive technologies and the collaborative economy. Click To Read Part 1 Customer Appreciation Day Customer Appreciation Day. Signs bearing this message have appeared regularly in store windows and print ads throughout the decades past – a well-intentioned

Enjoy Full Article

IBM To Acquire Aspera To Help Companies Speed Global Movement Of Big Data

aspera

IBM to Acquire Aspera to Help Companies Speed Global Movement of Big Data New Capabilities Allow Organizations To Reduce Transfer Time For Large Data Files From Hours To As Little As Seconds ARMONK, N.Y. – 19 December 2013: IBM (NYSE: IBM) today announced a definitive agreement to acquire Emeryville, CA-based Aspera, Inc. Aspera’s technology helps companies securely speed the

Enjoy Full Article

Good Bots And Bad Bots Online: They Outnumber Us

bot-traffic-report-2013

Good Bots And Bad Bots Online: They Outnumber Us Bots account for 61.5% of all Internet traffic, according to a new infographic published by online data security company Incapsula. This represents a 21% increase over the past year, and it signifies not only an increase in automated web traffic, but a significant increase in activity

Enjoy Full Article

Cloud Computing Expected To Continue Accelerated Growth

Virtual Office

Cloud computing is on the rise, with the worldwide market expected to rise from $111 billion last year to $131 billion in 2013. Gartner, Inc., one of the world’s leading information technology research firms, indicates its growth will continue well into this decade. By 2016, it predicts the majority of new IT spending will be

Enjoy Full Article

Cloud Infographic: Keeping Your Business Safe Online

Business-Cloud

Cloud Infographic: Keeping Your Business Safe Online Today’s information security teams increasingly rely on security systems with big data capabilities. In order to seek out and detect today’s complex advanced persistent threats you need to monitor network, host and application behavior across your organization’s IT data. Read this white paper to understand the evolving security

Enjoy Full Article

Cloud Infographic: Cross-Platform Malware

Malware-infographic-cloud

Beware of Computer Malware: The Cross-Platform Problem  There was a time where you could safely assume a portable drive hooked onto to a windows PC wouldn’t be able to transfer some strain of malware to a MAC system. Most viruses were a match made in heaven for Windows, and MACs were getting none of that

Enjoy Full Article

Understanding Twitter’s Security Enhancements

attacks-twitter

Understanding Twitter’s Security Enhancements Last week Twitter announced a significant security enhancement – enablement of forward secrecy on twitter.com, api.twitter.com, and mobile.twitter.com domains. The prime objective of this change is to deprive hackers of an important exploitation tool. Why was this necessary? In the past 18 months, Twitter, akin to many other social network companies,

Enjoy Full Article

Cloud Infographic: Crypto Web Report

crypto-survey

Cloud Infographic: Crypto Web Report  While we are all very happy about the entire cloud data storage concept and feel that it’s a breath of relief from the constant battle against malware, key loggers, PC monitoring software, and whatnot, we tend to forget that there are steps which we need to take to ensure security even after

Enjoy Full Article

What PCI DSS 3.0 Means For Cloud Service Providers

C J Radford - Data

What PCI DSS 3.0 Means For Cloud Service Providers The only constant is change. Earlier this month, the Payment Card Industry Security Standards Council released version 3.0 of the PCI DSS standard (along with the accompany Payment Application Data Security Standard).  In it are a few key focus areas that will directly affect Cloud Service

Enjoy Full Article

Symantec Report Keeps Cloud Users Security-Savvy

cybercrime-report

Symantec Report Keeps Cloud Users Security-Savvy Users of cloud services can easily fall foul of complacency.  With all personal data held on cloud servers, there is a strong temptation to worry less about threats to our device.  But for as long as we use devices for authentication and access to our cloud accounts, a threat

Enjoy Full Article