cybersecurity

Bitcoin: Seven reasons to be wary

Of all the virtual currencies out there, BitCoin is the most interesting from a technical perspective – and the least interesting from the business point of view. BitCoin is a peer-to-peer virtual currency that uses cryptography to control the creation and transfer of money. Unlike all other currencies, BitCoin is completely independent. “It is company […]

Bitcoin: Seven reasons to be wary Read More »

Virtual Worlds, Real Risks

Online communities and collaborative workspaces create operational and security vulnerabilities — but also opportunities to  deploy enterprise-grade, risk-based solutions. Carroll University’s library commons was a victim of its own success. The commons — which takes up an entire floor of  the library building — is a place where students gather and collaborate, get supplemental instruction

Virtual Worlds, Real Risks Read More »

Manage Those User Privileges

In most companies, too many employees have too many privileges. After all, they are quick to speak up when they need access to data or applications, but they tend not to be as quick to speak up when they no longer need that access. As a result, most companies see privilege creep. Employees are collecting

Manage Those User Privileges Read More »

Cyber Security Review

As threats proliferate, here are five areas where companies need to strengthen and update their policies and practices. It’s particularly galling when a company specializing in security issues gets monumentally hacked. That was the case for Stratfor, which suffered a massive data breach just before the holidays that exposed thousands of client names, e-mail addresses […]

Cyber Security Review Read More »

How to Survive a Cloud Outage

Amazon’s infamous cloud outage in April brought down a number of popular Web sites, including foursquare and Reddit – but many of Amazon’s enterprise cloud customers were able to weather the storm without experiencing downtime. They architected their systems for resiliency by using multiple availability zones, having hot backups in traditional data centers, or having

How to Survive a Cloud Outage Read More »

Driving Monitor

If an iPhone can make people healthier by tracking how many steps they take, why can’t something similar make cars and trucks safer by monitoring drivers’ behavior? Telematics equipment–black boxes–has been available for years, helping companies track the locations of their vehicles and the speeds at which they are traveling. Now the devices have become

Driving Monitor Read More »

Five iPad Safety Tips

1. Encrypt, encrypt, encrypt. There are two parts to the data encryption challenge – encrypting stored data, and encrypting data that’s moving over public networks, says  security expert Brian Reed, vice president of products at mobile security vendor BoxTone. SSL encryption on the  iPad is a fast and convenient way to protect data in motion.

Five iPad Safety Tips Read More »

Watch Your Avatars

Enterprise software helps set rules for virtual worlds Consumer-friendly technologies like Web-based e-mail and instant messaging, Twitter and Facebook have all brought compliance challenges, with companies typically reacting after something has gone wrong. With virtual environments and meetings, however, companies can get ahead of the trend, setting guidelines and preferred platforms before employees start adopting

Watch Your Avatars Read More »

The Great Risk Race

As Asia’s dynamic markets demand risk management attention and expertise, financial firms rush to fill a talent gap, with particular urgency in China. Three years ago, when Yang Haitao, an experienced financial risk manager, moved to Shanghai to join Nanyang Commercial Bank (China), he knew it was going to be more than a routine job

The Great Risk Race Read More »