White Papers
What is Cyber-bullying?
The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents worldwide. New technology has many social and educational benefits, but caregivers and educators have expressed concern about the dangers young people can be exposed to through these technologies.
No Company Is Immune to Data Loss
In today's business environment, media headlines are increasingly featuring data breaches of large magnitudes that put people's personal information at risk, and no country or industry is immune (Figure 1. Incidents by Business Type - All Time (Source: DATAlossdb.org/statistics)). With the changing landscape of business...
One of the most difficult issues security managers have is justifying how they spend their limited budgets. For the most part, information security budgets are determined by percentages of the overall IT budget. This implies that security is basically a "tax" on IT, as opposed to providing value back to the organization.
Mobile devices are now the centerpiece to consumer lifestyles. From e-mail communication, social networking, banking, games, music and video, mobile devices have forced a radical shift in the way in which organizations service their customers. In a June 2010 report on Internet trends, Morgan Stanley predicted that by 2012 the number...
Modern hardware trends and economics [1] combined with cloud/virtualization technology [2] are radically reshaping today's data management landscape, ushering in a new era where many machine, many core, memory-based computing topologies can be dynamically assembled from existing IT resources and pay-as-you-go clouds.
Cloud computing is an important transition and a paradigm shift in IT services delivery - one Cloud Computing that promises large gains in efficiency and flexibility at a time when demands on data centers Key Considerations are growing exponentially. The tools, building blocks, and best practices for cloud computing...
For years the software industry has promoted reduced privileges for user accounts as a key security best practice to prevent misuse and successful exploitation of end-point systems. There are two main rationales/assumptions that back up this strategy: (A) malware requires administrative access to successfully....
For years the software industry has promoted reduced privileges for user accounts as a key security best practice to prevent misuse and successful exploitation of end-point systems. There are two main rationales/assumptions that back up this strategy: (A) malware requires administrative access to successfully....
Is your Web site attacking your users?
The proliferation of malware designed to infiltrate computer systems without the owners' informed consent has become one of the most challenging security issues facing users today. Hackers are engineering ever more sophisticated viruses, worms and Trojan horses that can increasingly outsmart traditional defense mechanisms.
In an E-commerce environment, the risks associated with availability, performance, scalability and security should take priority in building a risk mitigation strategy. These factors are critical to consider even in a hosted E-commerce environment and should be addressed whether the organization is small, medium or large,...