Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




The spread of malware online has made many people fear attachments, apps and even web pages. Find out what kind of malware is out there and...


Passwords can be stolen, and multi-factor authentication can be cumbersome, so what's a good security option? Big-data-based authentication...


The battlefield no longer has to be a physical space - war is now taking place in cyberspace. White hat and grey hat hackers combat...


Humans are increasingly relying on machines, but these machines still rely on human input and supervision in order to be effective.


From the day that digital rights management was implemented, there have been entities determined to find ways around it. Is DRM worth the...


Most people in the U.S. have been receiving new credit cards with embedded EMV chips, but not everyone knows the facts about them.


IT is vital to business, which means that ensuring its security should be a top priority. If you're not following these guidelines, you may...


Cloud sprawl -- the unauthorized use of cloud services in an organization -- can be particularly problematic for an IT department. Here are...


With an influx of mobile devices in the workplace, mobile security is more important than ever. Make sure that your devices are secure with...


Data theft is an ever-growing problem, but the combination of big data and Hadoop promises to help identify it before it can do any harm.


Fraud is the leading cause of financial loss in the banking industry. However, the combination of Hadoop with machine learning has the...


Secure networks are critical for business. Here security experts share some of their secrets.


While we welcome the latest technological advances into our lives, they may be providing our private information to others. What should we...


Protecting your personal computer isn't that difficult, right? Well, protecting all of the machines in your enterprise can be nearly as...


Cloud access security brokers are gaining popularity, but what exactly are they and how do they help keep you secure in the cloud?


You don't want others getting their hands on your sensitive data, but at the same time, you don't want to spend the money to get your data...


Rowhammer is a memory problem that could be exploited via the Web. Learn about what it is and what's being done to counter it.


Your online activities could open you up to a world of trouble, like hackers, identity thieves and malware. Here are some tips for keeping...


Big data is a big deal - for both businesses and hackers. Even though big data can be a lucrative target for cybercriminals, there are...