- Deal in the works? BlackBerry delays Pakistan retreat by one month
- Data breach of toy maker VTech leaked photos of children, parents
- The week in security: Root-certificate stuff-ups send Dell, device makers scrambling
- Hackers taget toy maker VTech, make off with customer data
- Microsoft enables potential unwanted software detection for enterprise customers
This IDC infographic looks at how flash is designed to meet the new levels of intelligence needed to help organisations develop applications that accelerate business innovation and how the increase in flash storage adoption will change the landscape by 2018.
More than one-third of all cyber crime incidents and security breaches are caused by insiders. This whitepaper looks at how to develop a proactive insider threat mitigation program that combines three key elements: executive leadership and advocacy, clear policy and guidance, and workforce education and training. With these elements in place, your organisation can address insider threats before they become messy and costly public problems.
This whitepaper will focus on how and why Australian public service must adopt the information security disciplines to locate important data, understand what it’s worth and make sure it’s protected. The paper will examine how government agencies can reduce the extent and damage of cyber security breaches by becoming ‘good shepherds’ of their data.
Data has been growing faster than the ability to manage it. As a result, organisations cannot say for sure how much information they have, where it is or what secrets and risks it contains – it is effectively ‘dark data’. This whitepaper looks at how to address the situation with a new 4-stage approach by using technology tools and processes to enable information managers to search and govern all their unstructured data consistently and repeatedly.
The faster cyber security investigators can identify and contain data breaches, the less cost and damage their organisation will suffer. But hiring or contracting expert investigators can be expensive. This whitepaper looks at how technology can encapsulate this expert knowledge into a framework for investigating insider data breaches and external web server attacks.
Unstructured data formats are much harder to search and analyse than databases or simple text. In this context, ‘big data’ is a challenge, not an advantage. This whitepaper looks at how you can apply a data-centric approach across diverse business areas and shows how, having cracked open the content of unstructured data, your organisation can develop processes and competencies that will reduce costs, improve efficiency and deliver new sources of business value.
This case study looks at how a large financial institution used a sensitive data finder to locate vendor contracts that employees had stored in difficult-to-search locations such as email and file shares. Read how they were able to efficiently search very rapidly across massive volumes of data, conduct complex searches without creating a permanent index to help the firm fine-tune its searches and improve detection accuracy for each system.
This whitepaper covers the 20 simple questions you must ask about all-flash arrays that will set you up for success in your data centre roll-out. These questions will help you cover your bases when choosing a solution, looking at everything from design and efficiency to customer service.
An effective preventive maintenance strategy can be one of the most cost-effective measures you can take to ensure the ongoing health of both your critical equipment and overall business. Find out the most common causes of UPS failure, how regular maintenance practices so dramatically improve UPS reliability and performance, and the 10 elements an effective UPS maintenance plan should include.
While selecting the right data centre in terms of the facility, location, and reliability is critically important, SMBs need to understand they can realise significant value when they insist on maximising the operation. Find out why you should not assume equipment is well-tended just because the colocation is operating smoothly, why SMBs should take the initiative when it comes to organising, protecting, and managing their own equipment, and how you can achieve these goals effectively for the best result.
- The inaugural CMO50 list is revealed
- How Captain's Choice is cruising to a new level of digital engagement
- From tactical overhead to strategic growth driver: B2B marketing in the digital age
- Sensis overhauls NPS framework
- MCN to appoint first chief data officer as part of digital and tech-led c-suite overhaul