Top Tips For Android SecurityBy Matt Hartley
| Security Article Published on September 21, 2015
Perfect Android security isn’t possible, but Android users can do a lot to bulk up their Android device.
Flouting Risks, IT Pros Embrace IoT Tech: TripwireBy Pedro Hernandez
| Security Article Published on August 21, 2015
They should really know better: A majority of IT professionals are introducing smart devices into their corporate networks despite policies against the practice.
Microsoft's Vision of Cloud SecurityBy Sean Michael Kerner
| Security Article Published on April 21, 2015
Scott Charney, Corporate Vice-President of Microsoft's Trustworthy Computing, details what's wrong and what's right in security.
Hardening Ubuntu SecurityBy Matt Hartley
| Security Article Published on March 23, 2015
For Ubuntu security, mind your ports – and remember that your web browser is a scary thing.
Google Boosts Security in Chrome 41By Sean Michael Kerner
| Security Article Published on March 05, 2015
Google is paying out $52,000 in security awards as part of the new browser release.
Kaspersky MDM 'Knox' on Samsung DevicesBy Pedro Hernandez
| Security Article Published on March 02, 2015
The data security company adds Samsung Knox MDM and new self-service capabilities to its blended security-MDM platform.
Data Protection Trends 2015By Christine Taylor
| Security Article Published on January 14, 2015
An effective data protection plan encompasses data loss prevention (DLP), storage system recovery, and data security.
Linux Malware vs Phishing SchemesBy Matt Hartley
| Security Article Published on December 15, 2014
Are Linux users more threatened by malware or phishing schemes? The difference isn’t even close.