cybersecurity

Security Keys

What treasury and finance executives need to know about encryption Treasury and finance executives need to know enough about encryption and security to  ensure that those policies not only match the company’s general attitude towards risk, but  also account for particular risks associated with certain departments and processes. Encryption is a good safety measure because

Security Keys Read More »

Cloudy Outlook

Cloudy Does the cloud help or  hinder credit card payment  security and compliance? Depending on whom you ask, processing  credit card payments in the cloud is either  a great leap forward for security and  compliance, or a big step backward. Actually, it can be  either–depending on the type of cloud you have in  mind and

Cloudy Outlook Read More »

Bitcoin: Seven reasons to be wary

Of all the virtual currencies out there, BitCoin is the most interesting from a technical perspective – and the least interesting from the business point of view. BitCoin is a peer-to-peer virtual currency that uses cryptography to control the creation and transfer of money. Unlike all other currencies, BitCoin is completely independent. “It is company

Bitcoin: Seven reasons to be wary Read More »

Virtual Worlds, Real Risks

Online communities and collaborative workspaces create operational and security vulnerabilities — but also opportunities to  deploy enterprise-grade, risk-based solutions. Carroll University’s library commons was a victim of its own success. The commons — which takes up an entire floor of  the library building — is a place where students gather and collaborate, get supplemental instruction

Virtual Worlds, Real Risks Read More »

Cyber Security Review

As threats proliferate, here are five areas where companies need to strengthen and update their policies and practices. It’s particularly galling when a company specializing in security issues gets monumentally hacked. That was the case for Stratfor, which suffered a massive data breach just before the holidays that exposed thousands of client names, e-mail addresses […]

Cyber Security Review Read More »

How to Survive a Cloud Outage

Amazon’s infamous cloud outage in April brought down a number of popular Web sites, including foursquare and Reddit – but many of Amazon’s enterprise cloud customers were able to weather the storm without experiencing downtime. They architected their systems for resiliency by using multiple availability zones, having hot backups in traditional data centers, or having

How to Survive a Cloud Outage Read More »

Driving Monitor

If an iPhone can make people healthier by tracking how many steps they take, why can’t something similar make cars and trucks safer by monitoring drivers’ behavior? Telematics equipment–black boxes–has been available for years, helping companies track the locations of their vehicles and the speeds at which they are traveling. Now the devices have become

Driving Monitor Read More »