Free Newsletters :

Security Index

VMware Brings Disaster Recovery Service to the Cloud
By Sean Michael Kerner | Security Article Published on April 15, 2014
VMware says its vCloud Hybrid Service DR solution allows virtualized data centers to enable DR services in their existing deployments.
Does Heartbleed Disprove 'Open Source is Safer'?
By Bruce Byfield | Security Article Published on April 14, 2014
An open community is supposed to make software development safer – or at least open source adherents have always claimed so.
Google Chrome 34 Gets Responsive
By Sean Michael Kerner | Security Article Published on April 09, 2014
Google's upgrade to its Chrome web browser includes support for responsive images and fixes for 31 security issues. 
EMC Kicks off a Data Protection-as-a-Service Revamp
By Pedro Hernandez | Security Article Published on April 04, 2014
The data storage company announces several updates as it gears up for backup and recovery in the software-defined data center era.
BlackBerry MDM Certified FIPS 140-2 Compliant
By Pedro Hernandez | Security Article Published on March 26, 2014
The troubled handset maker's containerized Secure Work Space MDM solution offers government-grade encryption.
Are We Ready to Connect Our Bodies to the Cloud?
By Guest Author | Security Article Published on March 17, 2014
The upside to cloud-based data collection of personal health information is significant – but so are the potential risks.
Oracle Rolls Out Its MDM Platform
By Pedro Hernandez | Security Article Published on March 07, 2014
The business software giant takes aim at smartphones and tablets in the enterprise with its new Oracle Mobile Security Suite.
Fear of Big Data
By Jeff Vance | Security Article Published on February 28, 2014
No one likes being told they’re wrong, but in the Big Data age, we better start getting used to it.
Apple Gets Serious About MDM
By Pedro Hernandez | Security Article Published on February 27, 2014
The maker of iPhones and iPads touts its new device management options for businesses ahead of a new iOS 7 update.
Comodo Takes User-Centric Approach to Enterprise MDM
By Pedro Hernandez | Security Article Published on February 21, 2014
Company's new mobile device management offering features per-user, not per-device, licensing.
CloudPassage Raises $25.5 Million for Cloud Security
By Sean Michael Kerner | Security Article Published on February 13, 2014
Series C round of funding brings total funding up to $53 million as the cloud security market heats up.
Cloud Computing in 2014: Three Key Trends
By Jeff Vance | Security Article Published on January 13, 2014
Cloud computing's disruptive innovation will enhance data center options, even as security looms as an ever larger issue.
2014: The Year of Big Data Leaks
By Jeff Vance | Security Article Published on January 06, 2014
Cybersecurity threats will grow still more worrisome as hackers leverage the techniques of Big Data.
AirWatch Adds App Scanning to MDM Toolkit
By Pedro Hernandez | Security Article Published on December 04, 2013
The enterprise mobile management startup launches a new tool that sheds light on suspect apps.
Does BYOD Keep IT Admins Awake at Night?
By Rob Enderle | Security Article Published on November 26, 2013
Unmanaged BYOD is a disaster waiting to happen. Make sure it’s not your disaster.
Verizon Website Bug Allowed Access to Mobile Phone Metadata
By Robert Lemos | Security Article Published on October 24, 2013
A researcher released details of a Website flaw that could have allowed anyone with a browser to access the metadata of Verizon's mobile customers' messaging activity.  
10 Reasons Why Disaster Recovery Plans Fail
By Paul Rubens | Security Article Published on September 27, 2013
Your contingency plans may fall short in an actual disaster, yet they still need to be organized in great detail.
Breaking Down IT Network Threats: The Sources
By Guest Author | Security Article Published on September 26, 2013
The threats to your company’s networks range from DNS redirection to botnets to phishing and pharming.
Big Data Shakes Up Security (Which Isn't Always Good)
By Jeff Vance | Security Article Published on August 28, 2013
Security pros use big data to try to discover patterns that may indicate a crime is coming, even if it has not yet occurred.
Why Not Record Everything, All the Time?
By Mike Elgan | Security Article Published on August 28, 2013
New consumer gadgets let us record pictures, sounds and videos constantly. Is this good or bad?