Security Index

Microsoft's Vision of Cloud Security
By Sean Michael Kerner | Security Article Published on April 21, 2015
Scott Charney, Corporate Vice-President of Microsoft's Trustworthy Computing, details what's wrong and what's right in security.
Security, Privacy Rank Among the Top IoT Concerns: CompuCom
By Pedro Hernandez | Security Article Published on April 03, 2015
A new survey reveals that IT professionals are apprehensive about security and data privacy as the Internet of Things continues to expand.
Hardening Ubuntu Security
By Matt Hartley | Security Article Published on March 23, 2015
For Ubuntu security, mind your ports – and remember that your web browser is a scary thing.
Average Large Enterprise Is Riddled with 2,400 Dodgy Mobile Apps: Veracode
By Pedro Hernandez | Security Article Published on March 11, 2015
Add secure MDM to the growing pile of enterprise IT priorities. Most large businesses have thousands of mobile apps that can be leaking data and putting their users at risk.
Google Boosts Security in Chrome 41
By Sean Michael Kerner | Security Article Published on March 05, 2015
Google is paying out $52,000 in security awards as part of the new browser release.
Trends in Data Protection: Prevention and Recovery
By Christine Taylor | Security Article Published on March 04, 2015
Current strategies for data protection focus on data loss prevention (DLP), storage system recovery, and data security.
Kaspersky MDM 'Knox' on Samsung Devices
By Pedro Hernandez | Security Article Published on March 02, 2015
The data security company adds Samsung Knox MDM and new self-service capabilities to its blended security-MDM platform.
Data Protection Trends 2015
By Christine Taylor | Security Article Published on January 14, 2015
An effective data protection plan encompasses data loss prevention (DLP), storage system recovery, and data security.
Shuttleworth Explains Why Open Source is More Secure than Closed Source [VIDEO]
By Sean Michael Kerner | Security Article Published on December 30, 2014
Mark Shuttleworth reflects on security issues of 2014 and the 10 years that Ubuntu Linux has existed.
Google Takes Steps to Improve Gmail Security
By Sean Michael Kerner | Security Article Published on December 18, 2014
Content Security Policy comes to Gmail as Google search considers flagging non SSL secured web sites.
Linux Malware vs Phishing Schemes
By Matt Hartley | Security Article Published on December 15, 2014
Are Linux users more threatened by malware or phishing schemes? The difference isn’t even close.
Can You Secure Your Business Intelligence Data in the Cloud?
By Guest Author | Security Article Published on October 22, 2014
Due diligence is one of the most important steps businesses can take before choosing a cloud computing provider.
MDM Falling Short in the Enterprise
By Pedro Hernandez | Security Article Published on September 24, 2014
A new study from Raytheon and the Ponemon Institute reveals that businesses and MDM vendors are still struggling to come to grips with BYOD.
IBM Boosts Cloud Resiliency
By Sean Michael Kerner | Security Article Published on September 23, 2014
With an eye toward the disaster recovery market, IBM opens its largest US-based cloud resiliency center.
Good Technology's MDM Is Primed for iPhone 6
By Pedro Hernandez | Security Article Published on September 18, 2014
The smartphone and its big brother the phablet will soon start flooding the workplace, but Good Technology claim to be ready.
IBM Can Help Appleā€™s Trust Issues but Blackberry Could Steal Share
By Rob Enderle | Security Article Published on September 03, 2014
The nude celeb hacking scandal suggests that Apple could use IBM’s help.
Google Brings Chrome 37 Browser to 64-bit Windows
By Sean Michael Kerner | Security Article Published on August 27, 2014
In addition to new features, Google fixes 50 security flaws in its latest browser update.
Sophos and Check Point Blend MDM and VPN
By Pedro Hernandez | Security Article Published on August 26, 2014
The data security companies partner to keep unauthorized and non-compliant devices out of corporate networks.
Wearables Stoke Privacy Concerns
By Pedro Hernandez | Security Article Published on August 21, 2014
A majority of consumers are wary of about the privacy implications of wearable devices and the data they collect.
Issues in Mobile Device Backup
By Christine Taylor | Security Article Published on August 04, 2014
Mobile device backup is making big strides as companies get a handle on file sharing, governance, global deduplication and other key concerns.