Pod Slurping-An Easy Technique for Stealing Data

  • Source: GFI Software
  • Written By:
  • Published:
  • (Originally Published On:) )
Just when you thought you had all your security measures figured out, along comes the portable storage device to make you question them all over again. With the popularity of portable consumer products—and their ever-increasing storage space—comes a greater risk of losing sensitive corporate data. To secure corporate data, companies must not only focus on perimeter security, but on internal security weaknesses as well.

Featured Software Research:

4 Steps to Choosing the Right Device for Field Service Mobility

  • Source: IFS
  • Written By:
  • Published:
Choosing the right device for field service management needs is not easy. This white paper will guide you through the different factors, including your organization’s technology outlook, how a customer’s perceptions of you might be affected by the device, and how the hardware features make your employees more efficient. Know the four steps to consider for choosing the right device for your field service mobility needs. Read More

Analyzing Big Data: The Path to Competitive Advantage

Big data is different from ordinary database information because of the massive volume, the variety, and the velocity. And the data mix now includes product reviews, video, blogs, tweets, and more. But the biggest current challenge may be to articulate a compelling business case for using big data. Find out how companies in various industries are finding value in the data they have already collected and making it actionable. Read More

You may also be interested in these related documents:

Tokenization: A Cost-effective and Easy Path to Compliance and Data Protection

As companies work to meet regulatory requirements to protect personally identifiable information (PII) such as credit card numbers, one option to minimize the risk of loss is to replace sensitive data with a non-sensitive replacement value, or “token.” This white paper discusses how tokenization is implemented, its effectiveness in meeting regulatory requirements, and its impact on your IT systems and business processes. Read More

The Delphi Technique for Software Estimation

The Delphi technique—drawing wise counsel from senior and experienced software developers—can help you prepare estimates for software development projects. With this method of software estimation, project specifications are given to a few experts, depending on their availability. Learn about the essential steps involved in this software estimation methodology for more accurate estimates of software development effort. Read More

2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware

Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats. Read More
 
comments powered by Disqus