Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.

CommentaryMarketers should be asking how the firehose of data from social media, digital campaigns, mobile devices and cursor movements can be used to enrich the data they already have from internal sources
newsThe plan - issued last week by an agency of the Commerce Department - establishes a set of best practices for banks and other companies that support critical infrastructure to raise their cybersecurity game.
Information Management NewsThe federal government has published an initial framework for improving cybersecurity throughout the nation and across industries
TrendsWith rapid advances in technology security and legal teams face greater challenges in reviewing data to obtain meaningful information
TrendsFrost & Sullivan survey analyzes global Web and email content security market
TrendsNetwork technology and application/database security top the list, according to a survey from Novarica.
commentaryCommentary: The theft of big data will be one of 2014's recurring themes, so protect yourself.
TrendsAdoption by consumers and payment providers more difficult without security assurance, but obstacles prevent market growth
CommentaryThe use of public cloud services and applications by employees or business units without the permission of IT must be reined in
Comments (1)
TrendsPrivacy likely to take lead role in big data, analytics in 2014
Information Management NewsA new technology announced Thursday morning by ID Quantique encrypts data traveling between data centers. One target market is large banks, such as Bank of America, JPMorgan Chase and Citi, that run multiple data centers in the U.S.
Industry EventsThe CSA Congress is the industry's premier gathering for IT security professionals and executives who must further educate themselves on the rapidly evolving subject of cloud security. In addition to offering best practices and practical solutions for remaining secure in the cloud, CSA Congress will focus on emerging areas of growth and concern in cloud security, including standardization, transparency of controls, mobile computing, Big Data in the cloud and innovation.

Are you actively evaluating master data management technologies and their ability to scale and support emerging trends around big data, social and mobile?

Yes 61%
No 23%
Don't Know 9%
Not Applicable 6%


Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
Please note you must now log in with your email address and password.