News

Enterprise data privacy management

  • February 27, 2015 27 Feb'15

    Should enterprises place their bets on Android for Work?

    With Android for Work, Google gets into the BYOD business. Also in Searchlight: FCC votes yes on Net neutrality; sex bias lawsuit on VC firm Kleiner Perkins shakes up Silicon Valley.

  • February 16, 2015 16 Feb'15

    Hadoop security: Don't build your data lake without it

    Why security for Hadoop is different from traditional data management tools, a list of open source Hadoop security projects in the works, and CIO budget expectations for 2015: The Data Mill reports.

  • February 13, 2015 13 Feb'15

    Is Box enterprise key management a game changer for enterprises?

    Box wants to make the cloud your default location for classified data. Also in Searchlight: Your Samsung Smart TV might be eavesdropping; Apple takes off with JetBlue.

  • February 04, 2015 04 Feb'15

    Desperately seeking security

    Your enterprise is probably no further than six degrees of separation from a damaging data breach. In CIO Decisions ezine, find out how those seeking security can turn hindsight into actionable intelligence.

  • January 30, 2015 30 Jan'15

    FTC sounds the alarm on IoT privacy

    There are almost 5 billion IoT devices in use -- and counting. To reap their rewards, says the FTC, focus on consumer privacy, not just security. Also in Searchlight: Apple's quarter earnings make history; Amazon breaks into business email with ...

  • January 26, 2015 26 Jan'15

    Snowden: Data encryption is good, but not good enough

    Edward Snowden and Bruce Schneier talk data encryption and privacy in a networked world. The Data Mill reports.

  • January 16, 2015 16 Jan'15

    Should enterprises join the rush to use Docker's container software?

    Docker's brand of container software has tech giants buzzing. What's all the fuss about and should enterprises pounce? Also in Searchlight: Samsung-Blackberry acquisition rumor nixed; the U.S. Central Command's Twitter gets hacked.

  • January 05, 2015 05 Jan'15

    Searchlight List of Lists: Top tech predictions for 2015

    Our annual Searchlight List of Lists shows that 2014 wasn't all breaches and tech flops. The rise of the shared economy, the splashy debut of connected devices and personal assistant apps galore were just some of the highlights.

  • December 19, 2014 19 Dec'14

    North Korea behind Sony attack -- what now?

    The FBI pointed to North Korea as the culprit behind the Sony Pictures security breach, and reports hint the foreign government may have gotten inside help. Also on Searchlight: Yahoo CEO Marissa Mayer's flawed attempts to channel Steve Jobs; ...

  • December 12, 2014 12 Dec'14

    How is the Sony hack different from other attacks?

    The Sony data breach marks a new and scary frontier in corporate cyberwarfare. Also in Searchlight: Apple and IBM alliance bears fruit; the downfall of Pirate Bay.

  • November 14, 2014 14 Nov'14

    Cyberattackers breach USPS security, but what were they after?

    The USPS security breach is a reminder that cyberattacks are relentless. CIOs need to help their organizations prepare for 'left of boom.' Also in Searchlight: Obama takes a stand on net neutrality; IBM discovers a 19-year-old Microsoft bug.

  • October 31, 2014 31 Oct'14

    The White House got hacked; are you next?

    Russian-backed hackers could be at it again, this time targeting the White House. Experts advise businesses take a page from the hackers and get organized. Also in Searchlight: Apple CEO Tim Cook proudly comes out; Wal-Mart faces off with Apple Pay.

  • October 24, 2014 24 Oct'14

    Don't wait for the FBI to come knocking to plow more money into security

    As cybercriminals get more efficient and specialized, companies lean on their own employees and the government to stave off attacks. Also in Searchlight: Robots might join the Ebola fight; Apple's earnings exceed expectations.

  • October 22, 2014 22 Oct'14

    Security, cloud tied as top priorities for 2015 in CIO salary survey

    IT executives said 2015 will be the year of security, cloud computing and business intelligence/big data projects, according to TechTarget's IT Salary and Careers Survey. A lesser priority? Mobile technology.

  • September 26, 2014 26 Sep'14

    Bash shell bug puts enterprises in more peril than Heartbleed

    Enterprises beware of the Bash shell bug -- experts are calling it the most dangerous security flaw of the decade. Also in Searchlight: restaurant chain Jimmy John's falls prey to a data breach; Apple sells 10 million new iPhones and counting.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close