Enterprise data security and privacy

Enterprise data security and privacy News

  • March 06, 2015 06 Mar'15

    Mobile payments race heats up at Mobile World Congress 2015

    Mobile World Congress 2015 didn't disappoint, with breakthroughs in mobile payment, Internet connectivity, virtual reality and more. Also in Searchlight: Apple Pay fraud on the rise; former Secretary of State Hillary Clinton used private email for ...

  • March 04, 2015 04 Mar'15

    What are enterprises' biggest IoT security challenges?

    As the number of IoT devices in the enterprise grows, so do the potential risks. In this #CIOChat, participants identify the biggest IoT security challenges facing IT and the enterprise.

  • February 27, 2015 27 Feb'15

    Should enterprises place their bets on Android for Work?

    With Android for Work, Google gets into the BYOD business. Also in Searchlight: FCC votes yes on Net neutrality; sex bias lawsuit on VC firm Kleiner Perkins shakes up Silicon Valley.

  • February 18, 2015 18 Feb'15

    How to approach IoT security challenges and mitigate risks

    The lack of standards and architecture makes IoT security a challenge. In this #CIOChat, tweet jammers discuss how to cut down on the risks that come with the Internet of Things.

View All News

Enterprise data security and privacy Get Started

Bring yourself up to speed with our introductory content

  • point-of-sale security (POS security)

    Point-of-sale security (POS security) is the study of vulnerabilities in retail checkout points and prevention of access by unauthorized parties looking to steal customer and payment card details from them. Continue Reading

  • Backoff

    Backoff is point-of-sale malware that uses memory scraping  to steal credit card data from Windows-based retail machines on which it is installed. Backoff is used by criminals to gather valuable track2 data from credit cards. Continue Reading

  • consumer data

    Consumer data is the information trail customers leave behind as a result of their Internet use. Continue Reading

View All Get Started

Evaluate Enterprise data security and privacy Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Product Reviews

Powered by IT Central Station View All Evaluate

Manage Enterprise data security and privacy

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Enterprise data security and privacy Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close