Security

Subscribe Archives >
 

Managing Security in Today's App Economy

56 minutes ago | by Samuel Greengard

Cyber-security has emerged as a major challenge for businesses large and small. It increasingly impacts e-commerce, data management, employee collaboration, and a variety of other tasks and... Read More

 
 
 
 
 
 

LATEST STORIES

  • Is Shadow IT Holding Back Cloud Adoption?
     
    It's hard to secure what you don't know is there. A recent survey from the Cloud Security Alliance indicates that while organizations are clearly concerned about the security of data residing in cloud services, they also have surprisingly little...
     
    READ MORE
     
  • Rep. Will Hurd on Cyber-security & Civil Liberties
     
    The congressman, who heads the new House Information Technology Subcommittee, talks about cyber-security and how business and government can protect themselves.
     
    READ MORE
     
  • A Dating App May Break Your Heart—or Your Firm's
     
    Nearly half of organizations surveyed have at least one worker-installed dating app on mobile devices that are used to access confidential business information.
     
    READ MORE
     
  • Much of Security Software Is Underutilized
     
    One reason security software is not used to the fullest extent is that IT doesn't have the time or staff required to implement software solutions properly.
     
    READ MORE
     
  • Governance Is Key to Quelling Device & Data Sprawl
     
    In an era of device and data sprawl, concerns around IT governance are building. A recent survey from Forrester Research, commissioned by data governance vendor Druva, suggests that organizations will increase their focus on governance over the next...
     
    READ MORE
     
  • Fake Is the New Real
     
    Spammers routinely impersonate users to disseminate malware or misinformation. Without checking every time, it's easy to fall prey to phishing or Web scams.
     
    READ MORE
     
  • IT Security Pros Are Ready to Fight Cyber-Threats
     
    The IT security landscape in 2015 is setting up to be a study in contrasts: Confidence is high among security professionals, even though they expect to be victimized by more attacks, and, as a result, they are planning to significantly beef up their...
     
    READ MORE
     
  • Mobile Devices Ratchet Up Security Risks
     
    Over the last few years, mobility has radically redefined enterprise IT. It has introduced new requirements, new demands, and the need for entirely new technology platforms and connection points. A recent report from Check Point Software...
     
    READ MORE
     
  • Protecting Digital Identities and Devices
     
    Over the last few years, news about data breaches and breakdowns has reached pandemic levels. In many instances, the culprit is the ubiquitous password, which is increasingly ineffective in protecting digital identities and securing digital devices....
     
    READ MORE
     
  • Web Browser Flaws Are Huge Endpoint Security Issue
     
    With the number of exploitable browser vulnerabilities growing, many IT decision-makers surveyed said this made security more difficult than any other issue.
     
    READ MORE
     
 
 
 
 
 

Security Archives >

 
 
Manage your Newsletters: Login   Register My Newsletters



















 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date