Data centre news, training and research -

Search: security

More Results

Sort by: Relevance | Date
  • wearables security

    Wearables security is the area of system and data protection concerned with the particular risks related to computing devices worn on the user's body such as smartwatches, headsets and fitness trackers.

  • Security key to digital transformation

    In the future, we will go to systems of systems, which means we will need a secure and trusted ecosystem from the sensor to the user, says security firm Exceet

  • Oracle Advanced Security: Database security tool overview

    Expert Ed Tittel examines Oracle Advanced Security, a database security add-on product with transparent data encryption (TDE) and data redaction features.

  • Imperva SecureSphere: Database security tool overview

    Expert Ed Tittel examines Imperva SecureSphere Database Activity Monitoring and Database Assessment, products that are deployed as an inline bridge or as a lightweight agent to assess and monitor local database access.

  • How to ensure a secure API

    Application program interfaces, or APIs, are nothing new in the IT world, but over the past ten years, public-facing APIs have risen from a handful to over 10,000. The function of APIs is to add capabilitiies to Web applications and mobile apps,...

  • secure container

    A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps.

  • Security industry broken, says security researcher

    Information security professionals need to start really caring about security and ensuring the suppliers and businesses do the same, according to a security researcher

  • open security

    Open security is an approach to safeguarding software, hardware and other information system components with methods whose design and details are publicly available.

  • security by design

    Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards...

  • What should CISOs include in security reports?

    Security reports are a good way for CISOs to communicate with the board of directors. Here are specific topics that should be included in the reporting.

Search Again: