Data security & privacy applications News
January 13, 2017
New Microsoft privacy tools will give users control over the data collected on the web and within Windows. Experts hope the tools will offer data privacy transparency.
August 26, 2016
July 15, 2016
Pokemon Go is pushing augmented reality closer to enterprise adoption. Also on Searchlight, Microsoft wins in warrant case; Google hit with new charges.
July 07, 2016
Data scientists are in high demand, but in such scarce supply that some companies outsource their data for analysis. DataScience Inc. CEO Ian Swanson explains how it works.
Data security & privacy applications Get Started
Bring yourself up to speed with our introductory content
Evaluate Data security & privacy applications Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Several information security topics emerged as hot topics at RSA 2014. Learn three security topics enterprises should keep on their radar. Continue Reading
Manage Data security & privacy applications
Learn to apply best practices and optimize your operations.
While cookies can be helpful, mobile persistent cookies can pose a serious threat to users and enterprises. Expert Michael Cobb explains how to mitigate the risk and eliminate the threat. Continue Reading
In the Searchlight, protecting data is getting more hands-on as Snowden leaks mount. Plus, get moving on big data, get hired at Google and more. Continue Reading
Data security expert Ali Pabrai advises IT leaders to rely on encryption controls to shore up defenses in today's BYOD, mobile and cloud environment. Continue Reading
Problem Solve Data security & privacy applications Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A ransomware attack is not your typical data loss event. Some data protection vendors get the picture and are incorporating ransomware-specific features in their products. Continue Reading
As the use cases for the internet of things continue to expand into various sectors and the benefits of analyzing that data collected from IoT grow, the question of IoT data ownership and access privileges is coming to the fore. But we can't simply rely on traditional laws and regulations to set policies around IoT data, writes columnist and former CIO Harvey Koeppel. Instead, he says, we need a different way of thinking: one that will enable us to catch up with the fast evolution of IoT and other technologies.
In this SearchCIO handbook, Koeppel lists four broad, comprehensive questions around IoT data ownership that CIOs and IT execs should be considering and collaborating around to ensure not just their companies' success, but also the advancement of our society. In our second piece, CTO Niel Nickolaisen delves into why he thinks the "technology everywhere and in everything" world has moved IoT security and privacy to the top of CIOs' priority lists. In our last piece, Features Writer Jason Sparapani looks into two thorny IoT legal issues: data ownership and intellectual property rights.Continue Reading