![]()
Attract, Retain and Delight More Customers
Close more deals in less time, track your sales activities and access customer data from your mobile device.
Grow your business with Zoho CRM.
Sign up now for a free 15-day trial.
|
Locking Up Big Data to Unlock Its Value March 18, 2013
The bad news about Big Data: This business trend means enterprises now have more valuable information within their systems that must be protected. The good news about Big Data: The analytics and business intelligence that come along with the trend can also be used to improve risk management within organizations.
|
Feds' Case Against Journo Spurs Crime-and-Punishment Uproar March 16, 2013
The case of a journalist charged Thursday with aiding the hacker group Anonymous is sending up red flags in two camps: employers who must worry about security threats from disgruntled ex-workers; and a digital rights group that is finding troublesome parallels with the prosecution of the late Aaron Swartz.
|
|
How to Drink from the Big Data Firehose Without Drowning March 11, 2013
The arrival of big data means the end of the status quo for the enterprise. It means more than just sorting the sheer volume and velocity of information now available to companies. To be able to derive the most value from big data, large enterprises now have to consider its impact on issues such as security, risk and governance.
|
With Business Foundations Shaking, Good Enterprise Architects Are Hard to Find March 04, 2013
Enterprise architects are looking at several trends impacting their roles in the business world -- the growth of cloud computing, the arrival of big data, more security challenges, the overall rate of technological advances. These are the topics discussed at conferences.
|
|
A Porous Perimeter Perplexes Security Pros February 19, 2013
While it's a nasty pill to swallow for old-line security folks, the perimeter isn't what it used to be. The days when a company could hide behind its firewall and feel secure are gone. Pockets of resistance to that notion still exist, but the message is getting through to security pros.
|
Flaws in iOS 6.1 May Bruise Apple's Business Appeal February 15, 2013
Recent flaws found in Apple's mobile operating system, iOS 6.1, are raising questions about whether they could tarnish the iPhone's appeal in the enterprise. Since its arrival in January, Apple has had to push a number of updates to fix problems with the OS. It released a minor upgrade, version 6.1.1, to address a connectivity issue with devices using the software.
|
|
Attack on Fed Exposes Weak Patch Maintenance February 11, 2013
While many Americans watched the wrap-up of the Super Bowl Feb. 3, the band of hackers called "Anonymous" broke into a Web-facing server at the Federal Reserve and pilfered a list of some 4,000 people who work in the banking industry -- many of them ranking executives at banks and credit unions. Later in the week, the Fed acknowledged the break-in.
|
The Triple-A Approach to Enterprise IT Security February 04, 2013
Most companies tend to relegate information and technology security concerns to the IT department. It might seem like IT staff are the only ones who care about such matters, and security measures might seem like a necessary evil in today's business environment in order to protect proprietary and confidential information, but there is another side to security -- a non-techie, business side.
|
|
Oracle's Java Headache Worsens January 24, 2013
For Oracle and its Java programming language, the hurt just keeps on coming.
Fresh vulnerabilities have been discovered less than a week after Oracle updated Java to address two security flaws being exploited by hackers -- but wait, there's more. Net bandits launched a phishing campaign pushing bogus security updates for the software.
|
RIM Releases BYOD-Friendly IT Management Software January 23, 2013
Research In Motion released a new version of its BlackBerry Enterprise Service mobile device management software on Wednesday. This comes just over a week before the official launch of the new BlackBerry 10 OS and compatible handsets, and just days after RIM CEO Thorsten Heins suggested the company might abandon the hardware market and sharpen its focus on software.
|
|
Enterprise Security: No Perimeter Is Perfect January 21, 2013
Enterprises of all types are increasingly under attack by advanced persistent threats, which pose much greater danger than the lone hacker who just wants to use brute force to get in and deface their website. They are exploiting the disconnect between application security and perimeter security. The growing sophistication of intruders means they can gain access to an organization's entire infrastructure.
|
2 Buyers Shell Out $5K for Java Exploit January 17, 2013
An entrepreneurial hacker has found an exploit for a new zero-day vulnerability in Java and reportedly has sold it to at least two buyers at $5,000 a pop. News of the latest vulnerability follows on from a critical bug that emerged last week for which Oracle rushed out a fix over the weekend. The new zero-day exists in the patch Oracle rushed out, Java 7 Update 11, the seller claimed.
|
|
Why Bad Security Can Happen to Good People January 15, 2013
Sometimes you can do everything right and still run into trouble. To see this in action, pay attention the next time you're driving at dusk -- for example during an evening commute, if you have one. If you do this, chances are good that you'll notice at least one person with their headlights turned off. It's not that they're doing anything malicious.
|
Oracle's Java Fix Fizzles January 14, 2013
Oracle released a fix over the weekend for two serious vulnerabilities in Java, but this doesn't seem to have improved matters much. The vulnerabilities, which affect Web browsers using Java 7 plugins, let attackers remotely exploit target systems without needing a username or password.
|
|
Federal Agencies Face Mobile Tech Catch-22 January 08, 2013
The fast pace of mobile technology development can improve the ways we share information almost overnight, with new applications and more powerful devices rolling out on a regular basis. Federal agencies are trying to keep up with the times and have solidly embraced mobile IT but are stymied by having to meet federal operational requirements..
|
Defend Your Company by Attacking It From Within November 15, 2012
For those who aren't familiar with the acronym SWOT, it means, "strengths, weaknesses, opportunities and threats. SWOT analysis applies especially well to a tech venture, because tech companies have to be constantly aware of the ever-changing threats to their products and to their very existence.
|
|
Obama's Re-election Means IT Plans Can Be Executed November 13, 2012
One of the conventional views of political pundits after the Nov. 6 Presidential election was that both parties spent billions of dollars on the campaign for a result that did not change the political landscape all that much. Below the broad trends that keep political pundits in business, however, are the myriad federal issues that have a more direct impact on business.
|
Security Policy Begins With 'Can It Happen Here?' November 12, 2012
For a Fortune 100 company such as Liberty Mutual Insurance, security involves much more than preventing hacks and phishing attacks. The introduction of personal devices has created an array of new potential attack vectors. Security must now be introduced at the conception of a project, not as an afterthought. It needs to start with the board and work its way through the organization to every employee.
|
|
Many Hacks Claimed, Few Confirmed on Anon's Day of Mayhem November 06, 2012
Anonymous has been celebrating Guy Fawkes Day by engaging in various acts of mayhem online and turning out in person at sites across the globe to protest. Some of the reported hacks and other acts have turned out to be unsubstantiated. The attack claims include Symantec and ImageShack. PayPal also was reported to have been hacked, but a spokesperson says that's not true.
|
After the Breach: Culture of Honesty Restores Confidence November 05, 2012
The culture of security -- and the openness and responsiveness that make security systems work properly -- can have a huge beneficial impact on organizations. This is illustrated by the example of Heartland Payment Systems, which moved rapidly after allowing a massive security breach.
|
See More Articles in Enterprise Security Section >>


Headline Feeds




















