Home
 > Research and Reports > White Papers > Pod Slurping-An Easy Technique for Stealing Data

Pod Slurping-An Easy Technique for Stealing Data

Source: GFI Software
Just when you thought you had all your security measures figured out, along comes the portable storage device to make you question them all over again. With the popularity of portable consumer products—and their ever-increasing storage space—comes a greater risk of losing sensitive corporate data. To secure corporate data, companies must not only focus on perimeter security, but on internal security weaknesses as well.


Featured publications:

HR Manager to HCM Strategist in Four Easy Steps
Source: Ultimate Software Demand for global workforce visibility and insight is huge; yet many HR teams today are only able to produce data on what is currently happening or what occurred in the past. But HR needs to move beyond “what occurred,” applying full analytical capabilities to understand “why an event happened” so proactive changes can be made to improve overall business performance. This type of complex exploration and examination, where financial implications and cause and effect are studied, helps elevate HR to the most strategic level—transforming the HR manager to HCM strategist. Read this white paper to discover how cohesive business intelligence can proactively impact your organization. Read More...
Reflexis solutions help drive retail profitability
Source: Technology Evaluation Centers Published On: April 15 2014 Our analysts make sense of the enterprise software market
and offer guidance for your software selection. Read More...
Demystifying Data Science as a Service (DaaS)
Source: Simple Analytics With advancements in technology, data science capability and competence is becoming a minimum entry requirement in areas which have not traditionally been thought of as data-focused industries. As more companies perceive the significance of real-time data capture and analysis, data as a service will become the next big thing. India is now the third largest internet user after China and the U.S., and the Indian economy has been growing rapidly. Read this white paper to find out more about how data SaaS is set to become a vital part of business intelligence and analytics, and how India will play a role in this trend. Read More...


You may also be interested in these related documents:

The Delphi Technique for Software Estimation
Source: Chemuturi Consultants The Delphi technique—drawing wise counsel from senior and experienced software developers—can help you prepare estimates for software development projects. With this method of software estimation, project specifications are given to a few experts, depending on their availability. Learn about the essential steps involved in this software estimation methodology for more accurate estimates of software development effort. Read More...
How to Prevent Data Leaks and Achieve PCI Compliance
Source: Rapid7 The greatest threat on the Internet involves increased data theft, data leakage, and targeted attacks for the purpose of stealing confidential information. To combat this, the payment card industry (PCI) has created a data security standard (DSS) that holds all merchants—regardless of size—to much higher standards of performance when it comes to protecting customers’ financial and personal information. Read More...
A Roadmap for Achieving Enterprise Mobility Security
Source: BT INS The latest threat plaguing the corporate office is clipped to the belts and purses of your workforce—their mobile devices. And while employees have the ability to keep in touch, in real time, with their clients and the office, it also increases the risk of security breaches. Finding weaknesses and securing your mobile network should be one of your highest priorities—someone may be stealing your sensitive data right now. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.