Security Index

Digital Transformation Boosts IT Security Spending
By Pedro Hernandez | Security Article Published on March 30, 2017
IDC expects businesses' digital transformation initiatives to drive an increase in cybersecurity spending this year and beyond.
Data Privacy: 7 Trackers Collecting Your Personal Data
By Guest Author | Security Article Published on March 20, 2017
There’s data collection that creates great user experiences, then there’s data collection that takes place in the background without your consent.
Cisco's 2017 Cybersecurity Report: Things Are Much Worse
By Rob Enderle | Security Article Published on February 01, 2017
Attackers are moving fast, and enterprises are getting more security alerts than they can investigate.
Why Linux Installers Need to Add Security Features
By Bruce Byfield | Security Article Published on January 18, 2017
With the heightened security concerns, Linux distros need to make basic security options prominently available in their installers rather than options that users can add manually later.
10 Most Surprising Tech News Stories of 2016
By Cynthia Harvey | Security Article Published on December 20, 2016
Big mergers, big hacks and big product recalls dominated the tech industry headlines last year.
Google Chrome 55 Fixes Flaws, Blocks Flash
By Sean Michael Kerner | Security Article Published on December 05, 2016
Adobe Flash content will still run in Google'c Chrome 55 web browser, but users will need to specifically enable it.
Cloud Inspires Confidence in Disaster Recovery
By Pedro Hernandez | Security Article Published on November 23, 2016
IT managers who use cloud-based disaster recovery services sleep better at night than those who use on-premises solutions, according to a recent study from Zetta.
Linux Security Made Simple
By Bruce Byfield | Security Article Published on November 23, 2016
Linux security can be easier than you think. Here's a guide to reducing your Linux risks with a minimum of effort.
How to Create Bullet Proof Ubuntu Install
By Matt Hartley | Security Article Published on November 21, 2016
Learn how to protect your data in Ubuntu and restore to a working system should the unthinkable happen.
How to Secure Your Ubuntu Network
By Matt Hartley | Security Article Published on November 14, 2016
Ubuntu network security is certainly attainable, yet it requires some careful precautions.
Public Cloud Stokes Trust Issues
By Pedro Hernandez | Security Article Published on November 09, 2016
Businesses may be subscribing to cloud services in droves but many IT pros are increasingly casting a suspicious eye, a recent study from the SANS Institute shows.
Office 365: Yes, You Need Data Protection
By Guest Author | Security Article Published on October 20, 2016
Data protection for Office 365 is essential, despite the fact that 365 is hosted in the cloud.
Why Security Distributions Use Debian
By Bruce Byfield | Security Article Published on October 19, 2016
Debian may not talk a lot about security, but then fish rarely talk about water, either.
Cybersecurity: Complexity is Our Biggest Vulnerability
By Guest Author | Security Article Published on October 04, 2016
Organizations have helplessly watched as the network perimeter, a key component in securing an organization from threats, has dissolved.
Hardware Firewall: Choosing the Right Firewall Distribution
By Matt Hartley | Security Article Published on October 03, 2016
A survey of firewall solutions reveals both complex and simple solutions that may work for your system.