Subscribe to get all the news, info and tutorials you need to build better business apps and sites
We'll update you weekly with all the latest news and tips you need to develop and deploy today's business apps.
Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...
FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.
Virtualization creates virtual resources that can be used the same way as any physical resource or application. Disk drive partitioning is a familiar form of virtualization. Servers, networks, desktops, applications, and storage can all be virtual.
Automation replaces human work in repetitive, tedious tasks, and minimizes the number of errors. With the right automation tools it is possible to automate browser tasks, web testing, and online data extraction, to fill forms, scrape data, transfer data between...
The decision to use a third-party vendor or not depends on several factors. Regardless, cloud data security is a crucial part of business planning.
The cloud liberated computing power, applications, and data storage from reliance on specific hardware managed in a specific location. But the Cloud does typically exist in a specific location: a facility somewhere with racks of servers.
Increasingly, corporate work is being carried out on mobile laptops, tablets, and smartphones, and corporate data is being held outside of the company’s own systems.
Cyber risk leads to financial risk, but cybersecurity is still often thought of as a technical rather than a business problem.
Increased use of cloud applications and other developments are transforming WAN implementations, improving security in the process.