Editors' Picks
-
Don't overvalue predictive ability of data-crunching
Searchlight looks at a data-crunching crossing the line, why the Army needs to up its defenses, security threats, Amazon's latest offering and more.05 Apr 2013
-
Is analysis of data worth your IT staff's time? Tweet jammers talk big data
How much time should CIOs invest in the analysis of data? SearchCIO.com Twitter followers argue the significance of big data analytics.01 Apr 2013
-
Avoid chicken shortage and other hitches with social media integration
CRM expert Brent Leary tells businesses to train employees and share information among departments before making a splash in social media integration.29 Mar 2013
-
Understanding stripped-down hyperscale storage for big data use cases
Stripped-down hyperscale storage provides rapid, efficient expansion to handle big data use cases such as Web serving and database applications.26 Mar 2013
-
Lacking privacy laws aid growing CISO role in data privacy management
More CISOs may be taking on data privacy management. Fortunately, old, outdated privacy laws may lend them a helping hand.29 Jan 2013
-
Social media for businesses begs for more listening and less marketing
Some businesses have figured out social media CRM, but others still take a one-sided approach and don't hear customers, industry observers say.22 Jan 2013
-
Data center titans line up in support of Open Compute Project
Facebook's Open Compute Project has caught on, with AMD and Intel developing motherboards for the project's Open Rack infrastructure.17 Jan 2013
More Like This
-
Why sandboxing technology is integral for advanced malware detection
Expert Brad Casey details how advanced malware detection products rely heavily on sandboxing technology, though it's not a cure all for enterprises.03 Sep 2013
-
Converting to cloud: Ranum Q&A with Lee Heath
Not down with Dropbox? Lee Heath embraced shadow IT and improved his company's data security practices in the process.03 Sep 2013
-
Facebook shares climb back to flotation level
Facebook shares have briefly broken through the $38 flotation level for the first time since the company’s disastrous initial public offering01 Aug 2013
-
Choosing security software products: Does vendor revenue matter?
Expert Joe Granneman weighs in on the value of market revenue rankings when it comes to choosing security software.23 Aug 2013
-
Electronic identity cards join the fight against phishing attacks
A new approach to fighting phishing allows users to create electronic identity cards for each website they access.21 Aug 2013
-
OpenFlow security: Does OpenFlow secure software-defined networks?
Expert Brad Casey answers a question on OpenFlow security implications: Can the OpenFlow protocol foster software-defined networking (SDN) security?19 Aug 2013
-
TPM security overview: Defining the benefits of TPM devices
The nearly ubiquitous TPM device is an often-overlooked tool in an infosec pro's arsenal. Expert Michael Cobb details the benefits of TPM security.19 Aug 2013
-
Facebook to acquire UK startup Monoidics
Facebook is to acquire UK startup Monoidics, which makes code verification and analysis tools and specialises in detecting coding errors19 Jul 2013
-
Five major technology trends affecting software security assurance
Column: Gary McGraw says five shifts in the IT landscape are affecting software security, but several BSIMM best practices can limit risk exposure.09 Aug 2013
-
Report finds security tools add software vulnerabilities of their own
A report by iViZ Security Inc. found that overall vulnerabilities in security products in 2012 rose sharply.31 May 2013
-
Neohapsis: IPv4 plus IPv6 enables man-in-the-middle attacks
Neohapsis' Scott Behrens explains how having both IPv4 and IPv6 Internet protocols enabled can lead to man-in-the-middle attacks.09 Aug 2013
-
Enterprise app store encryption: Lessons to learn from Apple
After the Apple App Store's security mishap, expert Michael Cobb details the minimum enterprise app store encryption requirements.09 Aug 2013
-
Facebook delivers on mobile growth
Facebook delivered growth in the mobile market in the first quarter of 2013 with mobile advertising representing 30% of advertising revenue02 May 2013
Security Management Strategies for the CIO