HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Security News & Analysis

Will BlackBerry Once Again be King of Mobility?

2014-18-April-Blackberry-King.jpgRight now at least half of you are laughing at the title of this article, the other half are just being polite. But give me a chance to explain how and where BlackBerry could be the Future King of Mobility.

Hackers Use Viral Videos to Attack B2B E-Commerce Site

2014-08-April-Peanut-and-Linus-by-Asa-Aarons.jpg

You probably never thought about kittens, zombies and porn in the same breath — and the imagery gets even weirder if you throw the words "B2B e-commerce" into the mix.

But everything is possible on the Internet: even a distributed denial-of-service (DDoS) attack that employed an apparently unprecedented technique to cause thousands of online video viewers to unwittingly bombard a target website with junk traffic.

According to researchers from Web security firm Incapsula, the attack last Wednesday resulted from a persistent cross-site scripting (XSS) vulnerability on one of the biggest and most popular video sites on the web.

Incapsula co-founder Marc Gaffan declined to identify the site, but told CMSWire it ranks among the top 50 websites in the world by traffic based on statistics from Amazon-owned firm Alexa. That seems to narrow it down to one of two sites: Youtube.com — the third largest — or Xvideos.com — the 44th largest.

Someone capitalized on viral videos of something like cute cats … or maybe sex kittens … to surreptitiously turn website visitors into “DDoS Zombies” — in the hope of taking down an unidentified B2B e-commerce site.

You can't make this stuff up.

Metalogix Tackles Those Tricky Email Migrations

Metalogix Email Migrator 3.jpg

Very soon, your organization is going to be moving a large amount of content to the cloud, for financial reasons if nothing else. That can be especially tricky when the content involves email, which brings its own set of headaches.

Metalogix says it can ease your pain with its recently released Email Migrator 3.0, which enables organizations migrate mailboxes to another Exchange server or Office 365.

Don't Fight BYOD, Manage It

Don't Fight BYOD, Manage ItWhy fight BYOD? Employees are going to bring their spanking new mobile devices to work and use them. Instead of fighting it, smart companies are cautiously embracing BYOD for the sake of gains in productivity, flexibility and employee satisfaction. Implementing well thought out mobile device security and BYOD policies can keep up the pace of work while protecting information security. Here are a few tips that will help companies get the most out of their mobile device management (MDM) initiatives.

Enterprise Collaboration Tools a 'Must' For Business Success

AIIM lede.jpgMost organizations see collaboration as crucial to their success, but nearly two-thirds of those organizations feel confused about the dovetailing of collaboration and social tools.

And while document and content sharing outside the firewall is considered a necessary evil, many onsite systems have been secured against access to outside systems, forcing business workers to rely on unsecured file sharing systems.

These results and more from recent AIIM research points to a C-Suite that favors collaboration, but puts many obstacles in the way to achieving it.

Vendors Fail Regulated Industry Customers with Rush to the Cloud

Judging from the messaging, reviews and conversations that came out of the SharePoint conference earlier this month, the word from Las Vegas could be summed up as, "It's all about the cloud stupid!" 

With Office 365 growth surpassing SharePoint's, Yammer the new focus of social and the newest buzzwords, Office Graph and Oslo, the drum beat you hear is the continued push to the cloud.

7 Big Problems with the Internet of Things

new york city crowd

Reality is beginning to bite the Internet of Things (IoT). After months of enthusiastic discussion about  the opportunities it will provide and how much it will be worth, many of those looking to play in the IoT space are starting to look at the potential problems, including data management. 

Though everyone knows managing data will be a problem once the IoT is up and running at full scale, few have really considered the potential data storage problems.

10 Steps to Secure Your SMB

security.png

How can small- and medium-sized businesses (SMBs) protect themselves against cyberthreats? A recent report from security firm Lookout, written for Californians, is useful for SMBs in any state.

The report, "Cybersecurity in the Golden State," was published by the California Attorney General's office. It points out that "relatively small investments in cybersecurity preparedness can yield significant risk reductions."

Businesses Should Manage Records - Not 'Keep Everything'

paper and more paper.jpg

Many businesses claim they have been busy over the past two years developing and implementing records and information management strategies. But scratch the surface and you find many of those strategies aren't especially effective.

Blame a lack of employee engagement, a lack of commitment at the management level and the absence of meaningful ways to measure the strengths and weaknesses of these efforts.

Can Security and Compliance Coexist?

Both security and compliance are all about establishing (and implementing) standards that ensure an environment where company assets and data is accessed and utilized properly. So if you were asked, “Do you think security and compliance really coexist?” you’d most likely think it a dumb question and say, “Of course.”

But what if we challenge that notion a bit -- not so much to explore if they can coexist, but whether they do.

EMC's RSA Chief Calls Cybersecurity Experts to Action

EMC's RSA Chief Calls Cybersecurity Experts to ActionWhen RSA chief Art Coviello opened RSA’s information security conference earlier this week, there was an elephant room.

The elephant? Allegation(s) that his company had provided an NSA designed “back door” in its BSafe software which made it easy for the agency to decrypt information that RSA’s encryption software was supposed to keep private.

IBM, AT&T Extend Partnerships For Enterprise, IoT Security [Infographic]

In the wake of last week’s announcement that IBM and AT&T are getting together to support the development of the Internet of Things (IoT), many have expressed concerns about IoT and security. It seems, though, that both companies anticipated this and have announced plans to develop simplified, single-source network security products.

Will Alliance with AT&T Bring IBM Closer to the Internet of Things?

smart city.jpg

The $19 trillion Internet of Things (IoT) may be closer than you think. Two of the world's biggest companies -- IBM and AT&T -- just entered into a global alliance to develop solutions to support the IoT. 

According to a joint statement from the two US giants, the companies are combining their analytic platforms, cloud and security technologies "with privacy in mind" to gain more insights on data collected from machines in a variety of industries.

The alliance will focus on creating new solutions initially targeted for city governments and midsize utilities — organizations that intend to integrate and analyze vast quantities of data from assets such as mass transit vehicles, utility meters and video cameras, Mobeen Khan, executive director of Mobility Marketing at AT&T Business wrote in a blog post.

The Business Benefits of Hybrid Online File Sharing

file transfer.jpg

Fie sharing is making inroads into the enterprise content management (ECM) market as business users look for easier ways to shunt content around the enterprise. But recent research shows even the file sharing market is evolving with many users now looking for hybrid cloud/on-premises solutions, as opposed to the pure cloud-based approach.

In effect, many online file sharing (OFS) users are now looking for ways to store at least some of their data on-premises as an alternative to storing that data in third-party data centers, reversing the current trend to move everything to the cloud.

5 Tech Trends You Need to Know Right Now

Pointingcharts.jpg

Security, infrastructure intelligence and data analytics will be among the hottest business technology trends of 2014, according to a research paper commissioned by UK IT services firm Advanced 365.

The paper, written by technology analyst David Smith, chief executive, Global Futures and Foresight with Advanced 365, identifies the most "transformative technologies" and recommends steps businesses need to take to stay ahead of the curve — like embracing data analytics, gaining a better understanding of infrastructure intelligence and learning to manage cloud services growth.

Displaying 1-15 of 363 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next >