Stories by Shahida Sweeney

Features

Leverage big data: a practical guide

In a global economy, where information travels in nano-seconds, the potential of big data is taking centre stage. Here are some practical tips to manage your big data.

Jan 19 | Read more

News

IoT industry fails to build consumer trust

In a global rush to promote the Internet of Things (IoT) products and services, the industry is falling behind on building consumer trust, warns the US Federal Trade Commission’s privacy advocate, Edith Ramirez.

Jan 12 | Read more

Featured Whitepapers

PCI: It’s Not Just for Card Companies Anymore

Companies and retailers that process credit and debit cards are required to implement the requirements of the Payment Card Industry Data Security Standard (PCI DSS). This ebook looks at why many now feel that this standard should also be implemented by companies that are not required to do so due to its many benefits.

Download

Responding to Today’s Advanced Threats

True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. Find out in this product review how you can get visibility to detect threats to the organization and responding to them in a timely fashion.

Download

Detecting a Phising Email

It is critical to take proactive measures to protect yourself and your organisation’s security. Being vigilant and educating staff on the potential dangers of phising emails is a critical step in protection. This infographic illustrates the 10 things you need to know spot and handle phising email.

Download

Anatomy of a Hack Disrupted

With malware threats growing larger and more challenging to cope with each year, organisations can no longer rely on signature-based scanning of machines to identify these threats. Find out in this whitepaper how a comprehensive approach can ensure threats are automatically detected, isolated, identified, and disrupted well before any damage can be done.

Download

Editor's Recommendations