In the first part of this series, we looked at the definition of Big Data and the business benefits that companies are beginning to see from this new technology. Today, we drill down on what types of security data might make up a Big Data strategy, with an eye toward what types of analytics might help extract value from that data.
Cyber attacks originating in China have been discovered to spy on economic efforts at U.S. businesses, especially those in finance, technology and aerospace.
BYOD is a growing sensation in the business world, but the trend often leaves security as an afterthought. Three BYOD experts share their advice and experience on how mobile workers, home offices and BYOD can improve business while still managing data security.
Fifty-three Times employees' computers were hacked after the paper launched an investigation into the vast wealth of some of China's most influential families.
The PlayStation Network breach exposed 77 million customers' personal information, forcing some three million UK customers to change their bank account details and obtain new credit cards.