Quantcast
Channel: Security – ITBuzz
Browsing all 26 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Earthquakes, flooding bring new meaning to the global supply chain

Rojana Industrial Park in Ayutthaya Thailand, photo by Cpl. Robert J. Maurer, U.S. Marine Corps, 16 October 2011 (Photo is released to the public domain). As recent severe weather events on the eastern...

View Article



Image may be NSFW.
Clik here to view.

What we learned when we rebuilt our own data centre

When we rebuilt the Compugen data centre at our new headquarters, we had a chance to put our own solutions into practice. We have seen lots of advances in technology for datacentres in recent years –...

View Article

Image may be NSFW.
Clik here to view.

At Hamilton Health, you can bring your own tablet to work

One of my favourite topics is how organizations are overcoming the security challenges of supporting user devices on a closed network. Hospitals in particular are a great example because patient...

View Article

Image may be NSFW.
Clik here to view.

Truths end users never tell the IT department

Secrets. We all have them, especially when it comes to work habits. The question is, how secret are they really? I’ve often wondered if the IT department actually believes me when I tell them that my...

View Article

Image may be NSFW.
Clik here to view.

NSA, PRISM and public-cloud data: how safe is it?

It came to light this week that the National Security Administration (NSA) has had access to user data in public-cloud applications such as Facebook, Google, Apple and six other applications as well...

View Article


Image may be NSFW.
Clik here to view.

‘Lost’ smartphones experiment reveals that most people are snoops

Have you ever thought about what might happen if you left your smartphone behind? People are naturally curious, but when a lost mobile device is discovered, curiosity can lead to the violation of...

View Article

Image may be NSFW.
Clik here to view.

PRISM revelations mean we have less privacy than we thought

Recent headlines about the scope of government snooping on telecommunications activities in the United States have prompted reactions ranging from outrage on the negative side to affirmation or...

View Article

Image may be NSFW.
Clik here to view.

Social engineering: network security’s weakest point

Recent news about the NSA accessing personal information, and allegations of Canadian officials spying on their Brazilian counterparts, has brought surveillance and security issues to the public eye...

View Article


Image may be NSFW.
Clik here to view.

Healthcare security isn’t a sexy topic, but we need to talk about it

In a healthcare setting, there’s no doubt that security matters because hospitals deal with sensitive patient data. The only time we hear about data security in healthcare is when something goes wrong,...

View Article


Image may be NSFW.
Clik here to view.

5 things to do if you’re still running Windows XP

If all goes according to plan, today will be the last Patch Tuesday for Windows XP and Office 2003. And while rumours still abound that Microsoft will back down and offer a low cost support option,...

View Article

Image may be NSFW.
Clik here to view.

Empower users or protect assets? We shouldn’t have to choose.

Business operates in a digital world where we spend a significant part of our day connected and interacting with people, applications and information both inside and outside our organisation. For our...

View Article

Image may be NSFW.
Clik here to view.

IT Security: The door you didn’t know was open

As an IT security professional with many years in the business, I can’t remember a time when IT security has been as crucial to the success and survival of businesses. No matter how good a business...

View Article

Reducing Cost, Increasing Flexibility, and Facing Future Threats: VMWare NSX...

It is often difficult for companies to understand and appropriately react to paradigm shifts that require radically different thinking. For technology companies, having the flexibility to react...

View Article


Image may be NSFW.
Clik here to view.

Taking the first step towards IT security: Where to begin

In my previous post, I wrote about some of the many reasons why IT security is vitally important for businesses today. Now I want to look at some of the challenges that companies will face, and some...

View Article

Image may be NSFW.
Clik here to view.

It’s 2018, do you know where your recovery plan is?

Data is King. Be it customer data, supply chain and resource management data, or the valuable intellectual property that forms the core of a business, it is all data; and it all needs to be stored and...

View Article


Image may be NSFW.
Clik here to view.

It’s 2018, do you know where your recovery plan is?

by Mauricio de Leon Data is King. Be it customer data, supply chain and resource management data, or the valuable intellectual property that forms the core of a business, it is all data; and it all...

View Article

Image may be NSFW.
Clik here to view.

A Millimetre Away From Total Mayhem

Why every organization needs an Incident Response Plan In psychology, the phenomenon is known as illusory correlation. It’s a term that’s used to describe our ability as humans to perceive a...

View Article


Image may be NSFW.
Clik here to view.

À deux cheveux du chaos

Pourquoi chaque organisation a besoin d’un plan de réponse aux incidents En psychologie, le phénomène est connu sous le nom de corrélation illusoire. Il s’agit d’un terme qui est utilisé pour décrire...

View Article

Image may be NSFW.
Clik here to view.

How to find the right IT security partner

Beyond the technical issues that businesses face with IT security, the greatest stumbling block to making change and implementing effective solutions is the human element, which boils down to two key...

View Article

Image may be NSFW.
Clik here to view.

Five Ways Technology Drives Business Growth

Have you ever tried to use the self-checkout at the grocery store only to have the attendant come over multiple times because the system isn’t functioning as it should? The resultant delays often lead...

View Article
Browsing all 26 articles
Browse latest View live




Latest Images