Imagine walking into your home and suddenly becoming aware of an unknown presence. Only it's not someone hiding in the closet and it's not someone lurking just out of sight around the corner. It's someone monitoring you through one of your many connected devices. Although your smart home provides you with unprecedented convenience, the internet of things (IoT) also provides a … [Read more...] about Outside the Cloud: How to Secure Devices in the IoT
Data security
Big Data & Analytics Innovation Summit, Beijing
The Big Data & Aanlytics Innovation Summit, hosted by Innovation Enterprise, a two-day conference, gathering some of the best minds from the big data and analytics field across industries to share their success stories and best practices. Event Date: November 22 & 23 Event Venue: Swissotel Beijing, Hong Kong Macau Center, Beijing, China View the two-day schedule … [Read more...] about Big Data & Analytics Innovation Summit, Beijing
Why Blockchain-as-a-Service Should Replace Servers and the Cloud
Blockchain and big data are very similar in one big way: it's all about how you use them. Much like the Force in Star Wars, blockchain and big data are powerful tools that can be used to serve the dark or the good side. You could say they're two sides of the same coin. While blockchain is still emerging into the light, you might not think of big data in this way because plenty … [Read more...] about Why Blockchain-as-a-Service Should Replace Servers and the Cloud
8 Key Steps in Reacting to a Server Outage
One of the worst things that can happen to a data manager is an incident that causes server downtime. When your server is down, you may not be able to access the apps or the information you need to do your job, your clients and customers may not be able to reach your app, and worst of all, your data may become temporarily vulnerable. Fortunately, there are some key steps you … [Read more...] about 8 Key Steps in Reacting to a Server Outage
How to Use Honeypots As A Security Measure
Honeypots, as the literal term suggests, are systems set up for luring an attacker into committing an offence in a controlled environment. Honeypots are an important part of the security infrastructure of organizations throughout the software industry. They are often set-up up as the entry-point of other systems. Honeypots have different use cases depending upon where they are … [Read more...] about How to Use Honeypots As A Security Measure