Pod Slurping-An Easy Technique for Stealing Data

  • Source: GFI Software
  • Written By:
  • Published:
  • (Originally Published On:) )
Just when you thought you had all your security measures figured out, along comes the portable storage device to make you question them all over again. With the popularity of portable consumer products—and their ever-increasing storage space—comes a greater risk of losing sensitive corporate data. To secure corporate data, companies must not only focus on perimeter security, but on internal security weaknesses as well.

Featured Software Research:

Deploy Tactical, Affordable, Scalable Analytics

  • Source: IBM
  • Written By:
  • Published: December 17 2013
Self-service solutions empower business users to drive decision making. IBM analytics solutions are easy to install, configure, manage, and secure, and they scale to a broad set of users. Leaders have access to data across the business. These solutions deliver a unified experience across Web, mobile, and desktop, including solutions for reporting, analysis, predictive analytics, planning, forecasting, and regulatory reporting. Read More

Big Data, Little Data, and Everything in Between—IBM SPSS Solutions Help You Bring Analytics to Everyone

Regardless of the type or scale of business data your users need to harness and analyze, they need a straightforward, visual solution that is easy to use on the front end and highly scalable on the back end. Fortunately, IBM SPSS solutions provide just such an ecosystem that can make different kinds of data stores—from Hadoop to those proverbial spreadsheets—useful sources of business insight and decision support. Read More

Analytics: The Real-World Use of Big Data

  • Source: IBM
  • Written By:
  • Published:
Big data inspires new ways to transform processes, organizations, entire industries—and even society itself. Yet extensive media coverage and diverse opinions make it easy to perceive that big data is only for “big” organizations. So what is really happening? Our newest research finds that midsize organizations are just as likely to be using big data technologies to tap into existing data sources and get closer to their customers as any other company. Find out how. Read More

You may also be interested in these related documents:

How to Prevent Data Leaks and Achieve PCI Compliance

The greatest threat on the Internet involves increased data theft, data leakage, and targeted attacks for the purpose of stealing confidential information. To combat this, the payment card industry (PCI) has created a data security standard (DSS) that holds all merchants—regardless of size—to much higher standards of performance when it comes to protecting customers’ financial and personal information. Read More

A Roadmap for Achieving Enterprise Mobility Security

The latest threat plaguing the corporate office is clipped to the belts and purses of your workforce—their mobile devices. And while employees have the ability to keep in touch, in real time, with their clients and the office, it also increases the risk of security breaches. Finding weaknesses and securing your mobile network should be one of your highest priorities—someone may be stealing your sensitive data right now. Read More

Types of Prefabricated Modular Data Centers

Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.  Read More
 
comments powered by Disqus