Blogs

Showing Blog Posts: 1–7 of 7 by Robert Moskowitz

  • Cybercrime and Effective Cyber Law Enforcement

    by Robert Moskowitz on August 19, 2014

    These days, it's rare to open a news source (print or digital) without finding a story about cybercrime. Cybercriminals are hacking into databases, stealing credit and debit card account numbers, compromising individuals' identities, and shutting down legitimate websites. These articles highlight how necessary cyber law enforcement has become.Although data security budgets keep climbing and…

  • A Comprehensive Cloud Strategy for Data Security

    by Robert Moskowitz on August 1, 2014

    As popular as cloud computing has become, and as fast as it continues to grow, it brings with it a whole new set of data security concerns. Without a robust cloud strategy for ensuring security capabilities, cloud computing has little strategic value, particularly since a single data breach can cost an organization far more than it has gained from the advantages of cloud-based data storage. …

  • Given a Choice, Users Still Prefer 'Classic' Graphical User Interfaces

    by Robert Moskowitz on June 27, 2014

    A survey of Linux users shows that attempts to improve upon early, well-designed user interfaces are falling flat on their faces. Users like what they have right now on their computer screens and don't want any so-called "improvements" that force them to do, among other things, more clicking. These early graphical user interfaces (GUIs) are not easily defined. However, they generally include a…

  • Organizations Talk About Big Data More Than They Use It

    by Robert Moskowitz on June 13, 2014

    Lots of enterprise representatives are making claims about their movement into big data, but when you look behind the curtain, you can see they're moving at the rate of molasses. Here are some suggestions about why this may be the case, and how your organization can take steps to speed up the transition process: One reason may be that your organization has little idea of what it might do with so…

  • New Report Shows Retailers Slow to Make Use of Social Commerce Big Data

    by Robert Moskowitz on June 5, 2014

    The third annual Social Commerce IQ (SCIQ) report, based on survey results from 872 retailers regarding data from seven popular social platforms, shows that retailers have been slow to take advantage of the opportunities available to them in data from online consumers on brand awareness, traffic, and social CRM. The new report, prepared by social discovery pioneer 8thBridge, reflects the volume of…

  • Requirements for Encryption of Payment Card Data

    by Robert Moskowitz on April 24, 2014

    There are many specific criteria that must be met in order to comply with requirements for cardholder data encryption for credit and debit cards. The Payment Card Industry Data Security Standard (PCI DSS) provides specific security measures designed to protect cardholders—as well as merchants, processors, acquirers, issuers, and service providers (and others in the industry) from malicious…

  • Protect Against Internal Data Security Threats: Specific Strategies and Techniques

    by Robert Moskowitz on March 18, 2014

    Everyone's worried about anonymous hackers, but the smartest IT Security teams also keep a sharp eye out for internal data security threats such as leaks from disgruntled employees, paid spies, or even trusted workers who are susceptible to human error. While you cannot guarantee total information security, at any price, there are some cost-effective strategies and techniques to cut down on the…

This document was retrieved from http://www.rsaconference.com/blogs/by/114/moskowitz on Mon, 01 Sep 2014 14:34:58 -0400.
© 2014 EMC Corporation. All rights reserved.