Enterprise data security and privacy

Enterprise data security and privacy News

  • August 21, 2015 21 Aug'15

    Will data privacy finally come to the fore, post-Ashley Madison hack?

    Moral questions abound after the Ashley Madison hack, but will the latest high-profile breach finally spur companies to improve consumer privacy? Also: Amazon's data-driven motivation tactics under scrutiny; Target reaches breach settlement.

  • August 20, 2015 20 Aug'15

    #CIOChat: Are enterprises ready to upgrade to Windows 10?

    Industry experts think Windows 10 will become the leading OS for enterprises. Will businesses jump on the bandwagon? Join #CIOChat on Aug. 26, at 3 p.m. EST to discuss.

  • August 07, 2015 07 Aug'15

    Windows 10 privacy brouhaha: Overblown?

    Many are crying foul over the new Windows 10 privacy policy, but are they really just crying wolf? Also in Searchlight: Hackers attack Yahoo through Flash bug; hitchhiking bot is beheaded.

  • July 28, 2015 28 Jul'15

    Mobile payment methods come of age

    Cattle, grain, shells, metal coins, paper bills, plastic cards. Don't see a pattern? Look again: All of them were or are forms of payment, and all of them are mobile. Mobile device technology-enabled payments are simply the latest, natural ...

View All News

Enterprise data security and privacy Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Enterprise data security and privacy Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Product Reviews

Powered by IT Central Station View All Evaluate

Manage Enterprise data security and privacy

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Enterprise data security and privacy Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Taking the guesswork out of data ownership

    From the outset, data and data ownership have always been key components of IT, even as the focus of technology leaders has evolved. In the early days of information technology, the industry was all about just what its name suggests: leveraging ... Continue Reading

  • Next-generation security in a mobile era

    The early days of mobile computing are gone. Mobile apps continue to grow in number and complexity, and so has industry spend on mobile security, reaching almost $2 billion in 2014. Still, many experts say enterprises are significantly ... Continue Reading

  • The new security paradigm

    When it comes to the most high-profile data breaches of the past year -- Target, Home Depot, Sony and J.P. Morgan come to mind -- hindsight is 20/20. Security budgets are increasing in the wake of these massive breaches, and CIOs are employing new ... Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close