Tablets, Mobile Malware Heighten BYOD Security Concerns
With the increased popularity of powerful tablets and the rise in mobile malware, it's no surprise that Forrester research released today shows that IT managers feel uneasy about BYOD.
With the increased popularity of powerful tablets and the rise in mobile malware, it's no surprise that Forrester research released today shows that IT managers feel uneasy about BYOD.
The promise of big data is enormous, but it can also become an albatross around your neck if you don't make security of both your data and your infrastructure a key part of your big data project from the beginning. Here are some steps you can take to avoid big data pitfalls.
While 2011 is coming to an end, security threats show no sign of slowing down. UK-based Information Security Forum (ISF) vice president of sales and marketing, Steve Durbin, shared his four security predictions for 2012.
The cost of a <a href="http://www.networkworld.com/news/2011/030311-security-roundup.html?t51hb&hpg1=mp">data breach</a> went up to $7.2 million last year up from $6.8 million in 2009 with the average cost per compromised record in 2010 reaching $214, <a href="http://www.networkworld.com/news/2010/012510-data-breach-costs.html">up 5% from 2009</a>.
Toshiba on Tuesday introduced a new hard drive feature that can wipe out data after the storage devices are powered down.
We reached out to several IT security professionals in an effort to zero in on the true elements of an effective DLP programme. This article will focus specifically on five technological approaches that, when used together, offer a solid data defense.
1. Data discovery, classification and fingerprinting
The UK's Cabinet Office has published a range of mandatory measures to prevent a repeat of the data loss scandal that hit HM Revenue & Customs (HMRC) last year.
The IT Policy Compliance Group has released research showing 20% of enterprises suffer from more than 22 sensitive data losses per year.