data security

data security

The Power Of Data Exhaust

techcrunch.com
Scott Brown had a question about the number of parked domains he was hearing about: Do the domain providers have an email reply set up? What he found has led to the launch of Bounce.io, a five-month company that harvests 20 to 30 million bounced emails per day in what...
The Power Of Data Exhaust

Cloud storage grows, but backup is weak

www.computerworlduk.com
More companies are storing their data in the cloud as part of a hybrid onsite and offsite storage solution, but many admit they are not able to back up large chunks of their data at all. Research company Vanson Bourne surveyed 650 IT decision makers across the U.S., the...
Cloud storage grows, but backup is weak

Marriott Puts An End To Shady Ad Injection Service

techcrunch.com
Late last week, one Justin Watt discovered something suspicious going on with the wi-fi at his hotel, the Times Square Marriott. Not content to charge him hundreds for the room and $16.95 for internet access, it appeared that the service provider was using JavaScript injection to serve banner ads on...
Marriott Puts An End To Shady Ad Injection Service
Intel Beats The Street With Q3 Revenues Of $13.5B

IBM Takes a Big Data Approach to Security

bits.blogs.nytimes.com
Smartphones, cloud computing and the data explosion promise a revolution in communications, cost-savings and knowledge discovery. But those technology advances also open the door to a host of new security threats. I.B.M. is introducing new security products that rely on Big Data technology to tackle the data-security problem....
IBM Takes a Big Data Approach to Security

Humans Continue To Be 'Weak Link' In Data Security

it.slashdot.org
Humans Continue To Be 'Weak Link' In Data Security
House of Representatives blocks Spotify on its computers, citing P2P security concerns

Social Fortress Is A Simple (But Powerful) Skeleton Key/Data Security Service For Your Digital Life

techcrunch.com
Georgia-based Social Fortress may have started out as a pet project to make communicating on Facebook more privacy-friendly, but over the past two years, its ambitions have grown considerably loftier. After being bolstered by early positive feedback from players in the defense and information security industries, founder Adam Ghetti eventually...
Social Fortress Is A Simple (But Powerful) Skeleton Key/Data Security Service For Your Digital Life
When NASA loses laptops and phones, the data on them is usually unencrypted

Seven More Questions for Andreessen Horowitz Enterprise Dude Peter Levine

allthingsd.com
A few weeks ago, I published some highlights from a conversation I had with Peter Levine of venture capital firm Andreessen Horowitz. At the time, I promised that I’d add a second installment from more of our talk, which was pretty interesting, and here it is. At the point where...
Seven More Questions for Andreessen Horowitz Enterprise Dude Peter Levine
6 ways digital marketers can use Facebook's Custom Audiences feature
Nationwide Insurance uses lawyers to protect details of October security breach

Comcast launches app store for biz customers

gigaom.com
Comcast opened Upware, an app store featuring nine services for its small and mid-sized business customers on Wednesday. The app store isn’t a new idea, but it’s one that will bring in a new line of revenue for the ISP and serve one of its fastest growing customer bases. Comcast’s business...
Comcast launches app store for biz customers

Facebook wants to double Brussels staff (to 4 people) and intensify European lobbying

thenextweb.com
In a presentation to BELTUG, Belgium’s largest independent group of ICT managers, Facebook’s head of its Brussels office, Erika Mann, a former member of European Parliament and board member of ICANN, talked about her role at the social networking behemoth and the work she does out of Europe’s capital city....
Facebook wants to double Brussels staff (to 4 people) and intensify European lobbying

TNW’s Daily Dose – 24 hours of tech news in 5 minutes [Audio]

thenextweb.com
Amazon appears to be testing in-app payments, Path increases user data security, and Tumblr hits Facebook Timeline. It’s all in today’s Daily Dose. You can catch The Daily Dose every Monday through Friday right here on The Next Web. Make sure to hit the subscription button of your choice below...
TNW’s Daily Dose – 24 hours of tech news in 5 minutes [Audio]

Obama’s Framework for “Consumer Data Privacy” And My “Data Bill of Rights”

battellemedia.com
It sort of feels like “wayback week” for me here at Searchblog, as I get caught up on the week’s news after my vacation. Late last week the Obama administration announced “Consumer Data Privacy In A Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital...
Obama’s Framework for “Consumer Data Privacy” And My “Data Bill of Rights”

'Wall of Shame' exposes 21M medical record breaches

www.computerworld.com
Over the past three years, about 21 million patients have had their medical records exposed in data security breaches that were big enough to require they be reported to the federal government....
'Wall of Shame' exposes 21M medical record breaches

'Fair data' logo promotes ethical standards for collecting consumer data

news.techworld.com
Consumers worried about how their personal data might be misused by private and public sector organisations can from today look for a new 'Fair Data' logo to calm their worries, the Market Research Society (MRS) has announced. Launched on Data Privacy Day, 28 January, with the enthusiastic endorsement of...
'Fair data' logo promotes ethical standards for collecting consumer data

30 Tech Skills That Will Instantly Net You A $100,000+ Salary

www.businessinsider.com
When you have the right tech skills, you can command a great salary. But it's an ever-changing target. One day a skill is hot and the next it's not. Job site Dice.com just sent us a list of tech skills that are worth over $100,000 a year. And that's just...
30 Tech Skills That Will Instantly Net You A $100,000+ Salary

Sponsored post: 5 key considerations when deploying a mobile BYOD program

gigaom.com
Nowadays, employees expect unfettered access to corporate data. In fact, 68 percent of employees are already using their personal devices for work, according to a recent survey by Globo. While there are many benefits to a “bring your own device” friendly workplace, such as increased productivity and lower expenses, companies...
Sponsored post: 5 key considerations when deploying a mobile BYOD program

Is Your Cloud Provider Exposing Remnants of Your Data?

www.computerworld.com
Security researchers report that incorrectly configured hypervisors can lead to a separation of data issue in multi-tenant environments that can expose data remnants. However, you can prevent hosting your data on 'dirty disks.'...
Is Your Cloud Provider Exposing Remnants of Your Data?

That's an affirmative on BlackBerry 10 security certification, sir

www.engadget.com
RIM may be falling out of favor with certain government departments, but it's not removing the earpiece or pocketing the shades just yet. The National Institute of Standards and Technology has granted the BlackBerry 10 platform FIPS 140-2 certification, which basically means data security and encryption are top notch...
That's an affirmative on BlackBerry 10 security certification, sir

KPMG survey finds a 'stronger than expected' demand for cloud services

venturebeat.com
Despite concerns about data security and loss of control, cloud-based service providers are highly-confident about the growth of the industry through to 2014. The confidence stems from the fact that they are delivering cost savings for customers; a KPMG International survey released today found that technology companies can expect...
KPMG survey finds a 'stronger than expected' demand for cloud services

Citrix follows Box's lead by adding content editing and secure synching to its ShareFile mobile apps

thenextweb.com
Citrix, a cloud, networking, and virtualization technology company, will announce on Tuesday that it is updating its ShareFile file-sharing app with better mobile content editing. What this means is that the service aims to compete against Box and other enterprise-focused file sharing services, hopefully allowing users to be more productive...
Citrix follows Box's lead by adding content editing and secure synching to its ShareFile mobile apps

Serious Apache Exploit Discovered

tech.slashdot.org
bennyboy64 writes "An IT security company has discovered a serious exploit in Apache's HTTP web server, which could allow a remote attacker to gain complete control of a database. ZDNet reports the vulnerability exists in Apache's core mod_isapi module. By exploiting the module, an attacker could remotely gain system privileges...
Serious Apache Exploit Discovered

Pirate Bay Founder Remains Locked Up Without Charges

torrentfreak.com
Following his arrest late last month, Pirate Bay co-founder Gottfrid Svartholm was deported from Cambodia to Sweden. Initially it was assumed that Gottfrid was sent to Sweden because of the outstanding one year prison sentence in the Pirate Bay case. However, once he touched down at Stockholm’s Arlanda Airport, the...
Pirate Bay Founder Remains Locked Up Without Charges

RIM Rolls PlayBook 2.1 Update, Improves BlackBerry Bridge, Data Security, And Android App Support

techcrunch.com
RIM is not done with the PlayBook. The company just announced a major update for its tablet. The software update will be available later today for the WiFi PlayBook and brings a host of significant improvements. With this update the tablet now sports SMS capabilities through BlackBerry Bridge, data encryption...
RIM Rolls PlayBook 2.1 Update, Improves BlackBerry Bridge, Data Security, And Android App Support

RT @mkcapital: @Kontiki Achieves SAS 70 Type II Certification - 1st Enterprise Video SaaS to Pass Data Security Audit: http://bit.ly/c9RZ7S

www.businesswire.com
RT @mkcapital: @Kontiki Achieves SAS 70 Type II Certification - 1st Enterprise Video SaaS to Pass Data Security Audit: http://bit.ly/c9RZ7S

What a CXO needs to know about data security in the age of WikiLeaks

www.computerworld.com
It takes more than technology to defeat a threat from inside the company. The ongoing WikiLeaks saga, and the associated, repeated unauthorized disclosures of information, is more than an escapade against the government. These leaks dramatically document the exposure that confronts all enterprises from trusted individuals, be they careless or...
What a CXO needs to know about data security in the age of WikiLeaks

Illinois Supreme Court nixes latest porn trolling scheme

arstechnica.com
The Illinois Supreme Court has rejected a pornography vendor's efforts to unmask thousands of non-Illinois Internet users who allegedly accessed the vendor's website without permission. The order came after a coalition of ISPs objected to the subpoenas. The decision is another sign of the growing judicial resistance to pornographic trolling....
Illinois Supreme Court nixes latest porn trolling scheme
× Just a test of the new info bar. What do you think?