Cyber bullying-A digital epidemic
What is Cyber-bullying?
The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents worldwide. New technology has many social and educational benefits, but caregivers and educators have expressed concern about the dangers young people can be exposed to through these technologies.
Data Loss Prevention: Keep Sensitive Data-In-Motion Safe
No Company Is Immune to Data Loss
In today's business environment, media headlines are increasingly featuring data breaches of large magnitudes that put people's personal information at risk, and no country or industry is immune (Figure 1. Incidents by Business Type - All Time (Source: DATAlossdb.org/statistics)). With the changing landscape of business...
Justifying IT Security-Managing Risk & Keeping Your Network Secure
One of the most difficult issues security managers have is justifying how they spend their limited budgets. For the most part, information security budgets are determined by percentages of the overall IT budget. This implies that security is basically a "tax" on IT, as opposed to providing value back to the organization.
Addressing Advanced Fraud Threats in Today's Mobile Environment
Mobile devices are now the centerpiece to consumer lifestyles. From e-mail communication, social networking, banking, games, music and video, mobile devices have forced a radical shift in the way in which organizations service their customers. In a June 2010 report on Internet trends, Morgan Stanley predicted that by 2012 the number...
The Hardest Problems in Data Management
Modern hardware trends and economics  combined with cloud/virtualization technology  are radically reshaping today's data management landscape, ushering in a new era where many machine, many core, memory-based computing topologies can be dynamically assembled from existing IT resources and pay-as-you-go clouds.
Cloud Computing -how to navigate the ongoing shift
Cloud computing is an important transition and a paradigm shift in IT services delivery - one Cloud Computing that promises large gains in efficiency and flexibility at a time when demands on data centers Key Considerations are growing exponentially. The tools, building blocks, and best practices for cloud computing...
Cyber criminals do not need administrative users
For years the software industry has promoted reduced privileges for user accounts as a key security best practice to prevent misuse and successful exploitation of end-point systems. There are two main rationales/assumptions that back up this strategy: A) malware requires administrative access to successfully....
The (in) security state of SCADA software systems
Recently, there has been an increase of publicly disclosed vulnerabilities in Supervisory Control and Data Acquisition (SCADA) software systems . This wave of reports underlines the ever increasing interest in analysing the security of such systems. In this blog entry we are going to discuss the vulnerable components of SCADA software systems...
Maintaining Trust-protecting your website users from malware
Is your Web site attacking your users?
The proliferation of malware designed to infiltrate computer systems without the owners' informed consent has become one of the most challenging security issues facing users today. Hackers are engineering ever more sophisticated viruses, worms and Trojan horses that can increasingly outsmart traditional defense mechanisms.
Critical risk factors in an ecommerce environment
In an E-commerce environment, the risks associated with availability, performance, scalability and security should take priority in building a risk mitigation strategy. These factors are critical to consider even in a hosted E-commerce environment and should be addressed whether the organization is small, medium or large,...