The latest evolution in data security leaves numbers behind and returns to the physical world: A plastic token filled with microscopic glass spheres, and it looks like a much harder nut to crack than the codes of the past.
So persuasive is cloud computing that companies have been known to plunge into it with gusto while turning a deaf ear to warnings from information security officers, who see gaping holes in the corporate data security fabric where business managers see agility and economic benefit.
FORBES: Cloud Computing Hides Big Issues In Corporate Data Sharing
Russell Dietz is vice president and chief technology officer at SafeNet, a global leader in information security, and has more than 25 years of technology experience in the data management, security, embedded and distributed systems industries.
FORBES: Securing Data in the Cloud? Call in the Magnificent Seven
Cloud computing companies can invest far more resources in data backup and security than your business can.
Since data in cloud-based software resides outside the company, customers must have confidence in the security of data and the reliability of data storage.
FORBES: Salesforce Eats Market Share But Stock Is Too Expensive
At Equifax, data security is paramount and we have stringent security measures in place for protecting the data entrusted to us.
The benefits of keeping data in the data center, combined with advanced security features have propelled virtualization to be a top business initiative.
FORBES: Virtualization: A Solution For The Tablet Security Conundrum
To date over the last century the firm has invested in more than 130 companies in healthcare, clean tech, and data security around the world, particularly in emerging markets.
FORBES: Bets On Facebook, Twitter, Emerging Markets Grew Venture Capital By 76% In Q1
The company will also invest in security and data analysis software.
Symantec is very strong in security, data protection, and a small bit of management and automation, but it lacks a significant number of capabilities Dell needs to enable truly converged infrastructure and cloud automation.
Security features include TPM1.2 data security technology, BIOS built-in security, and a Kensington lock connector.
ENGADGET: GammaTech rugged T7Q launches at $2k and up, promptly steals your iPad's lunch money
Earlier this year he dispatched Farina and a few other of his 100-plus employees (most of whom work out of the company's offices in Pune, India) to collect wireless security data at 20 U.S. airports and eight in Asia.
The number of clients seeking our advice about privacy and data security has ballooned in the last couple of years, for obvious reasons.
FORBES: Cyberattacks -- Is North Korea Already At War With Us?
For example, 85 percent of the executives surveyed report that they face significant obstacles in dealing with big data, including security issues, a shortage of trained staff, and the need to develop new internal capabilities.
Bloomberg Chief Executive Daniel Doctoroff said the company wants to "go even further and get the benefit of independent leading experts so that we set the new standard for privacy and data security, " in a statement announcing Mr. Palmisano's appointment Friday.
WSJ: Bloomberg Taps Ex-IBM Chief Palmisano to Look Into Data Practices
Any claims or allegations that we have violated laws and regulations relating to privacy and data security could result in negative publicity and a loss of confidence in us by our listeners and our advertisers, and may subject us to fines by credit card companies and loss of our ability to accept credit and debit card payments.
FORBES: Smartphone Apps Get Pulled Into a Criminal Investigation
And Verizon could face big hurdles in getting the new technology adopted, says Amy DeCarlo, principal analyst, security and data center services at Current Analysis in Sterling, Virginia.
FORBES: Verizon Makes Push Into Health With What Looks Like Gmail, But Isn't
And, in the payments industry, self-policing is in place through the PCI-DSS (Payment Card Industry Data Security Standard) which, while not a federal law, has become law in some states.
FORBES: The Epsilon Hack Attack: Time For "SOX For Consumers"?
Two partners finished their studies by the time the quartet left the school in 1996 and shifted the focus to data security.
The M5S Series has persisted on the Plextor's high-quality imperative for its SSD and can greatly satisfy users' demands for durability, data security, and stability in SSD's.
ENGADGET: Plextor M5S SSD coming mid-July: healthy speeds starting at $99 for 64GB
Almost three months after a hacking incident that compromised sensitive data used in its authentication tokens, security firm RSA has resorted to a last-ditch fix: a product recall.
FORBES: RSA Offers To Replace Some Customers' Compromised SecurID Tokens
Unfortunately, people operate on human time scales and are simply incapable of discovering all of the information about a network that changes from hour to hour and turning that data into changes in the configuration of security devices.
And, for those of us in the business of providing security and data protection, it raises even more questions: If corporations, such as Epsilon, are not stepping up to willingly adopt the readily available security technology that will prevent these thefts, what more can and should be done to give consumers some sense of protection?
FORBES: The Epsilon Hack Attack: Time For "SOX For Consumers"?
In addition to recent poll data showing George W. Bush ahead with security moms, their sentiments were much in evidence in focus groups conducted this summer by Family Security Matters - a new organization the Center for Security Policy has helped founder Carol Taber create to speak to, and for, such women.
In addition to studying new companies, BSIMM 3 for the first time provides longitudinal data on the security process at eleven of the thirty companies profiled in May 2010.
As a result, interest in enterprise tech companies in areas such as cloud, big data and security have increased.
However, if those technologies can easily be repurposed to efficiently mine data in a military context, then national security concerns could arise in a sale to a foreign buyer.
FORBES: If You Want to Buy an American Company, Ask Permission, Not Forgiveness
On Thursday, the PCI Security Council released a document hinting at the changes expected in the fall in both PCI DSS and the Payment Application Data Security Standards (PA DSS).
FORBES: Payment Card Industry Punts On Key Security Questions
The ZOTAC RAIDbox accommodates up to two mSATA SSD drives and lets users select the best storage mode to suit their needs whether its maximum performance with RAID 0, enhanced data security with RAID 1, independent drives with JBOD or a simply span data in the BIG mode.
ENGADGET: Zotac's StreamBox and RAIDbox build upon the ZBOX's HTPC pedigree
应用推荐