Linux Malware vs Phishing SchemesBy Matt Hartley
| Security Article Published on December 15, 2014
Are Linux users more threatened by malware or phishing schemes? The difference isn’t even close.
MDM Falling Short in the EnterpriseBy Pedro Hernandez
| Security Article Published on September 24, 2014
A new study from Raytheon and the Ponemon Institute reveals that businesses and MDM vendors are still struggling to come to grips with BYOD.
IBM Boosts Cloud ResiliencyBy Sean Michael Kerner
| Security Article Published on September 23, 2014
With an eye toward the disaster recovery market, IBM opens its largest US-based cloud resiliency center.
Good Technology's MDM Is Primed for iPhone 6By Pedro Hernandez
| Security Article Published on September 18, 2014
The smartphone and its big brother the phablet will soon start flooding the workplace, but Good Technology claim to be ready.
Sophos and Check Point Blend MDM and VPNBy Pedro Hernandez
| Security Article Published on August 26, 2014
The data security companies partner to keep unauthorized and non-compliant devices out of corporate networks.
Wearables Stoke Privacy ConcernsBy Pedro Hernandez
| Security Article Published on August 21, 2014
A majority of consumers are wary of about the privacy implications of wearable devices and the data they collect.
Issues in Mobile Device BackupBy Christine Taylor
| Security Article Published on August 04, 2014
Mobile device backup is making big strides as companies get a handle on file sharing, governance, global deduplication and other key concerns.
Security, the Edward Snowden WayBy Mike Elgan
| Security Article Published on July 23, 2014
Security applications recommended by Edward Snowden – who probably knows as much about Internet privacy as anyone.
Study: IT Lacks Faith in Cloud ProvidersBy Andy Patrizio
| Security Article Published on June 26, 2014
IT and security professionals expect cloud services to increase the likelihood and economic impact of data breaches.