Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.


NewsRaytheon is investing $1.57 billion to create a new cybersecurity company with private-equity firm Vista Equity Partners LLC as the defense contractor seeks to capitalize on emerging threats to private data and broaden its customer base in the business world.
Data PrivacyWikiLeaks published more than 200,000 internal Sony Pictures Entertainment documents and e-mails, opening a new chapter in the hacking saga that enveloped Sony Corp.’s Hollywood studio late last year.
NewsUC Berkeley, Stanford University and State Street Global Exchange have launched the Consortium for Data Analytics in Risk (CDAR), which will promote data-science techniques to manage and mitigate economic and financial risk.
NewsThe Pentagon will miss its own 2016 deadline to create cybersecurity teams to defend critical computer networks from hacking and they won’t be fully operational until 2018, a senior Defense Department official said.
NewsMore than 50 percent of businesses currently use or plan to use cloud-based business intelligence, but several common hurdles have limited cloud-based BI adoption in some organizations, according to just-released survey results.
NewsRussia rejected a report that its government had been involved in hacking a non-classified White House computer network.
Information Management's DM RadioBig data is everywhere these days, and that's part of the security challenge. In many cases, organizations use their existing security infrastructure to manage access to big data, but that approach won't always work. How can your company ensure that big data remains safe and sound? Register for this episode of DM Radio to find out! Host Eric Kavanagh will interview Dr. Geoffrey Malafsky, Phasic Systems; Rich Skinner, Brinqa; Sam Heywood, Cloudera; and Maksim Yankovskiy, Zettaset.
NewsRussian hackers were behind an intrusion in recent months into a non-classified White House computer network.
NewsThe proliferation and sophistication of hackers, combined with increased reliance on interconnected applications, devices and systems has complicated the IT security landscape, according to new research.
AdviceWhile the political ramifications and motives of Emailgate will continue to swirl around Hillary Clinton, it’s a moment in time for all businesses to take a closer look at their own information collection, retention, protection and access practices.
Comments (1)
AnalysisReady to roll out a business analytics platform? Here are five five dos and don’ts for managing information and data assets while diving into analytics.
Comments (1)
NewsPresident Barack Obama signed an executive order Wednesday allowing the use of economic sanctions for the first time against perpetrators of destructive cyber-attacks and online corporate espionage.
Twitter
Facebook
LinkedIn
Please note you must now log in with your email address and password.