Data centre news, training and research -

Search: security

More Results

Sort by: Relevance | Date
  • secure container

    A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps.

  • open security

    Open security is an approach to safeguarding software, hardware and other information system components with methods whose design and details are publicly available.

  • security by design

    Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards...

  • security through obscurity

    Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.

  • security through obsolescence

    Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public. Less common or obsolete software has fewer issues with malware as it lacks the market share that...

  • security through minority

    Security through minority is an approach that relies upon infrequently-used code for its effectiveness. 

  • Learn from the past: Ensure a secure future of information security

    To ensure the future of information security, enterprises must learn from the past, launch proper training and install the right technologies.

  • hardware security module (HSM)

    A hardware security module (HSM) is a physical device that provides extra security for sensitive data.

  • IoT security (Internet of Things security)

    IoT security is the area of endeavor concerned with safeguarding connected devices and networks in the Internet of things (IoT). A major concern is to make sure that security remains an important part of product...

  • An introduction to cloud container security

    While the benefits of cloud containers are readily apparent, there aren't clear guidelines on how to secure the technology. Expert Rob Shapland offers pointers on how to stay safe.

Search Again: