IBM announced a wide range of security software solutions to help organizations protect their information and identities within and outside the company in massive data environments such as Big Data, mobile and cloud computing. Specifically, IBM presented ten products and improvements for organizations to deal with new security threats and challenges arising as a result…

Phishing is a popular scam to bait internet users into providing private information. It usually acquires information for the purpose of identity theft. A “phisher” usually sends emails to various individuals and claims to be a legitimate entity. People are duped into providing their personal information, mostly of financial nature, because they believe that the…

TechSoup in partnership with TechSoup Global Network conducted its 2012 Global Cloud Computing Survey among 10,500 nonprofits, charities, and non-governmental organizations (NGOs) from 88 countries on the use of technology hosted in the cloud at nonprofit organizations. The objective of the survey was to determine the current state of the technological equipment of these organizations…

The already huge amount of data generated by businesses, users and devices, has experienced explosive growth in the near future will require analysis for competitive advantage. The key to productivity will transform big data into business intelligence. The problem of big data is about to become relevant for large enterprises, and they need to prepare…

The Ponemon Institute published a study on the global use of encryption of sensitive data by users in the cloud. Beyond the results, the document also provides an interesting perspective on the perception of cloud and security by companies from different countries. The study conducted by Ponemon Institute in association with computer security specialist Thales…

One of the main criticisms being levied at Cloud computing is its inherent security flaws. After all, the whole concept of cloud computing introduces possible security risks that are not present in conventional IT setups. However, a growing number of technologists are making the argument that clouds, contrary to popular belief, are actually more secure…

Last week’s highlight at the Black Hat Security Conference in Las Vegas included Qualys security upgrade on its cloud platform. Phillipe Courtot, chief executive was very proud to announce that the cloud-based security has been contributing $65 million dollars of revenues each year. One of their newest product offering includes QualysGuard consulting edition, whose features…

Internet traffic in 2010 exceeded all traffic accumulated from when the Internet was founded until 2009. This data was released by Cisco, one of the giant tech firms today. Cloud computing and software as a service (SaaS) are a major contributor. For business owners, whether small, medium or large scale, this is the perfect time…