Emerging technologies, like cloud computing, and the economic turmoil of the past five years have put tremendous pressure on businesses to transform their business processes to make them leaner, more efficient and more competitive. Increased collaboration between geographically dispersed workers and with business partners has become the norm. But the unwieldiness of many enterprise collaboration tools has led many workers to turn to insecure collaboration channels like email and consumer-grade file sharing services.
Stories by Thor Olavsrud
When it comes to security, a large number of organizations have a glaring hole in their defenses: their applications.
For the first time in seven years—and despite numerous high-profile incidents—the average cost of a data breach fell in 2011, according to new findings released by Symantec and the Ponemon Institute.
Big Data is all the rage these days, and more than a few organizations are at least wondering what sort of business intelligence they could derive from all the information at their disposal.
As Super Bowl XLVI approached this year, Cars.com was facing a thorny issue. For the third year in a row it was running a big-budget ad during the game. In 2010 and 2011 the high-profile ads drew huge numbers of car shoppers to its site--a definite win--but the spike also slowed performance to a crawl.
A large number of enterprises have not implemented automated server access controls, exposing themselves to risks ranging from insider fraud and corporate espionage to regulatory compliance issues and even nation-state sponsored attacks, according to a recent report by information security research firm Echelon One and enterprise access management specialist Fox Technologies.
As enterprises seek to move into the big data world -- digitizing paper documents and saving email communications, Word docs, Excel files and all sorts of other unstructured data with the hopes of mining them for actionable business intelligence -- they need to address a big problem up front: Storage.
Google yesterday cut the cost of Google Cloud Storage--a service geared to enabling developers to store and access massive amounts of data on Google's infrastructure--between 8 percent and 15 percent depending on the service tier. Google also noted that third-party technology providers have begun integrating Google Cloud Storage directly into their offerings.
Protected health information (PHI) data breaches are growing in frequency and magnitude as the healthcare industry moves to adopt electronic health records (EHR), say a group of standards and security organizations. The healthcare industry must take action to better defend PHI if it wants to keep the public's trust, they say.
Delivering software on-demand from centralized servers or the cloud was the great promise of application streaming technology. But Osman Kent, CEO of startup Numecent (formerly known as Endeavors Technologies) says that promise was tarnished. Kent believes it's time the technology delivered.
That was the consensus of six panelists brought together by information exchange solutions specialist IntraLinks in a roundtable discussion Thursday morning at the Gabarron Foundation in New York City.
Many organizations have now gone so far as to dip their toes into the shallow end of cloud computing, and many more are thinking about testing the waters. Other organizations have jumped into the cloud with both feet. But whether you're wading in or fully immersed, properly vetting your cloud service providers is essential.
Big data gets a lot of buzz these days and organizations are increasingly concerned about the problem of managing it, but many don't really understand what big data is.
SSL certificates are a fundamental component of secure online transactions, but a majority of organizations admit that they have an inaccurate or incomplete inventory of their certificate populations, according to a new study conducted by Osterman Research on the behalf of enterprise key and certificate management (EKCM) provider, Venafi. Salt Lake City-based Venafi calls that a worst practice that presents a substantial risk for security and compliance incidents.
It's an oft-repeated mantra: Organizations engaged in or investigating cloud computing in any of its many flavors are concerned about security. In fact, concerns about security, data privacy and data residency are often cited as inhibitors to cloud adoption. But are the concerns justified? Some security experts say visibility and control are the missing elements.