Enterprise data security and privacy

Enterprise data security and privacy News

  • January 30, 2015 30 Jan'15

    FTC sounds the alarm on IoT privacy

    There are almost 5 billion IoT devices in use -- and counting. To reap their rewards, says the FTC, focus on consumer privacy, not just security. Also in Searchlight: Apple's quarter earnings make history; Amazon breaks into business email with ...

  • January 26, 2015 26 Jan'15

    Snowden: Data encryption is good, but not good enough

    Edward Snowden and Bruce Schneier talk data encryption and privacy in a networked world. The Data Mill reports.

  • January 16, 2015 16 Jan'15

    Should enterprises join the rush to use Docker's container software?

    Docker's brand of container software has tech giants buzzing. What's all the fuss about and should enterprises pounce? Also in Searchlight: Samsung-Blackberry acquisition rumor nixed; the U.S. Central Command's Twitter gets hacked.

  • January 05, 2015 05 Jan'15

    Searchlight List of Lists: Top tech predictions for 2015

    Our annual Searchlight List of Lists shows that 2014 wasn't all breaches and tech flops. The rise of the shared economy, the splashy debut of connected devices and personal assistant apps galore were just some of the highlights.

View All News

Enterprise data security and privacy Get Started

Bring yourself up to speed with our introductory content

  • point-of-sale security (POS security)

    Point-of-sale security (POS security) is the study of vulnerabilities in retail checkout points and prevention of access by unauthorized parties looking to steal customer and payment card details from them. Continue Reading

  • Backoff

    Backoff is point-of-sale malware that uses memory scraping  to steal credit card data from Windows-based retail machines on which it is installed. Backoff is used by criminals to gather valuable track2 data from credit cards. Continue Reading

  • consumer data

    Consumer data is the information trail customers leave behind as a result of their Internet use. Continue Reading

View All Get Started

Evaluate Enterprise data security and privacy Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Product Reviews

Powered by IT Central Station View All Evaluate

Manage Enterprise data security and privacy

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Enterprise data security and privacy Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close