123ArticleOnline Logo
Welcome to 123ArticleOnline.com


Here's the recent articles submitted by lauren ellis

Articles By lauren ellis

Page: << <   [1]  2  3  4  5    > >>


Leveraging Data Loss Prevention To Counteract Internal Threats   By: lauren ellis
Data loss prevention is a tool primarily used by chief information officers, chief information security officers, and information technology teams.(read entire article)
View : 602 Times
Category : Computers

Cloud Security Must Be Enforced At Modern Enterprises   By: lauren ellis
In this past decade, the cloud computing market has been growing at an unprecedented, breakneck pace. Cloud computing is now considered as one of the fastest growing industries, especially in the subsection of information technology.(read entire article)
View : 480 Times
Category : Computers

Cloud Security Remains Top Concern For Chief Information Officers   By: lauren ellis
Cloud computing is a major disruptive technology that has influenced thousands of businesses of all scales, in all sectors. Cloud computing has provided enterprises with cheaper costs, quicker deployment, and efficient accessibility features.(read entire article)
View : 673 Times
Category : Computers

The Great Russian Hacker Heist & The “shadow Id” Problem It Exposed   By: lauren ellis
On Monday the world learned that a small crew of Russian hackers stole 1.2 billion internet passwords. Before digging into what this means to your enterprise's information security posture, I must first commend Nicole Perloth and David Gelles from the New York Times for their excellent journalism in breaking this important story.(read entire article)
View : 404 Times
Category : Computers

Don't Neglect Data Loss Prevention (dlp) For The Cloud   By: lauren ellis
There was a time when data loss prevention (DLP) efforts were focused on storage devices, email, and printing. However, now that you can take your device with you, in the form of a laptop or mobile phone, a lot more attention has been focused on devices themselves.(read entire article)
View : 361 Times
Category : Computers

Prevent The Loss Of Ip Through Code Sharing Sites   By: lauren ellis
Coding is not just for software companies anymore. Companies in every industry – financial services, transportation, media, manufacturing, healthcare – all rely heavily on developers to create internal software that keeps their businesses running and provides an advantage over the competition.(read entire article)
View : 375 Times
Category : Computers

The Consumerization Of It, Byoc, And The (new) Role Of It   By: lauren ellis
It has been a decade since Nicolas Carr published his controversial essay “IT Doesn't Matter” in the Harvard Business Review. Back then, he claimed that companies weren't really getting a competitive advantage from the technology advances – the bits and bytes – of hardware and software.(read entire article)
View : 333 Times
Category : Computers

24 Hours After Heartbleed, 368 Cloud Providers Still Vulnerable   By: lauren ellis
Over the past weeks, security teams across country have been grappling with end of life for Windows XP, which is still running on 3 out of 10 computers. That issue has been completely overshadowed with news of the Heartbleed vulnerability in OpenSSL, which is used extensively to secure transactions and data on the web.(read entire article)
View : 472 Times
Category : Computers

100,000 Tweets In 1 Day – How One Company Discovered A Security Breach Using Big Data Analytics   By: lauren ellis
As the recent breach involving millions of Target customer credit cards illustrates, security breaches leave a pattern of activity that is mathematically unusual. As cyber criminals increasingly use the cloud as an attack vector, these attacks also create anomalous activities that indicate something is wrong.(read entire article)
View : 393 Times
Category : Computers

Tweetdeck — Just Another Hack Or A Missed Opportunity To Tighten Cloud Security?   By: lauren ellis
The recent TweetDeck hack on Twitter presents a common cloud dilemma for information security teams. On the one hand, the BYOX trends that drive cloud service adoption and worker self-enablement are transforming traditional IT into a User-Centric IT model that focuses on empowering and enabling workers.(read entire article)
View : 372 Times
Category : Computers

See As RSS
Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: