Data and Information Security

Data and Information Security | News, how-tos, features, reviews, and videos

Email encryption  >  An encrypted binary 'at' symbol with a keyhole.
Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Download the Hadoop Deep Dive

Businesses are using Hadoop across low-cost hardware clusters to find meaningful patterns in unstructured data. In this in-depth PDF, InfoWorld explains how Hadoop works and how you can reap its benefits

Download the Cloud Security Deep Dive

The scalability of cloud computing depends on sharing resources that were never shared before, creating a new set of risks -- and demanding a new set of security best practices

Load More
You Might Also Like