"Forever Data 2013" details the vision of Spectra Logic's future and the data storage industry.
- By Ginger Hill
- Oct 07, 2013
With sensitive documents spread across tablets, laptops, smartphones and other devices, how do businesses keep this data safe?
Data from Google scanning can be used for more than just targeting advertising, though what Google might be doing with private information is currently under seal.
- By Antonia Gregory
- Sep 19, 2013
Fulcrum Biometrics created a customized patient identification solution for the New Tribes Mission Medical Clinic in Papua New Guinea using the Fulcrum Biometric Framework (FbF) Demographica application and the Lumidigm M-Series multispectral fingerprint reader to capture and identify fingerprints.
The key to data loss prevention is to always backup your data, but there are other ways to help prevent data loss in laptop computers.
- By John Riddell
- Sep 03, 2013
Organizations worldwide face a dangerous shortage of cyber warriors who possess the skills required to defend against cyber terrorism. A pragmatic and sustainable new approach is urgently needed to prepare cyber warriors to defend critical infrastructures.
How to manage and evaluate cost-effective solutions through the storage model for hosted video surveillance solutions.
It's time to recharge your iPhone battery, but before you plug in make sure it’s not a “Mactan!”
- By Ginger Hill
- Aug 01, 2013
The risk is still here and demands a data-centric approach to security.
New off-site tracking is Twitter’s way of relaying information to advertisers to create customized ads.
- By Ginger Hill
- Jul 24, 2013
American universities concerned as cyber attacks try to barge their way in.
- By Ginger Hill
- Jul 17, 2013
Google targeted about the vast amount of personal data it collects on a daily basis from users.
- By Ginger Hill
- Jul 11, 2013
As the world moves more and more toward digital, securing data is essential.
- By Ginger Hill
- Jun 25, 2013
As the security industry continues to grow, dealers and integrators must focus on trends within the industry in order to position themselves for growth.
- By Ginger Hill
- Jun 17, 2013
Features critical security advancements, including the ability to accurately identify the origin of Web application traffic to proactively distinguish between legitimate and malicious sources.
Cybercriminals are taking a toll on small businesses. Revealed here are some of cybercriminals' most popular tactics and how small businesses can counter-act them.
- By Ginger Hill
- May 23, 2013
Known simply as SWAC, this Secure Worker Access Consortium, driven by RTTG's Real-Time Verification (RTV) technology platform, is a comprehensive, highly-secure, information-sharing program that helps to ensure that workers who access critical facilities or key infrastructures are known, safe and threat-free.
Tyfone combines local- and cloud-based technologies for trusted verification of passwords, biometrics and other digital ID credentials to counter security breaches.
HID Global’s focus areas of use for new applications include authentication of items, secure data management and trusted authorizations.
Meanwhile, 46% admitted to bypassing security to get their job done, and 40% admitted that if they were breached no one would notice.