Security Index

Flouting Risks, IT Pros Embrace IoT Tech: Tripwire
By Pedro Hernandez | Security Article Published on August 21, 2015
They should really know better: A majority of IT professionals are introducing smart devices into their corporate networks despite policies against the practice.
Linux Concerns: Convenience vs. Security
By Bruce Byfield | Security Article Published on August 10, 2015
Is Linux secure? Only if you work at it.
Personal Clouds Are Casting Their Shadows over Enterprise IT
By Pedro Hernandez | Security Article Published on August 07, 2015
Businesses are facing new IT management challenges as employees embrace cloud services that span across their personal and work lives, according to Gartner.
IoT Security Market to Reach Nearly $29 Billion by 2020
By Pedro Hernandez | Security Article Published on August 06, 2015
The future looks bright for IT security vendors, particularly those that use the cloud to shield Internet of Things data from prying eyes.
ARM Acquires Sansa Security for Hacker-Resistant IoT
By Pedro Hernandez | Security Article Published on August 03, 2015
The mobile processor giant snaps up the Israeli security company to help safeguard IoT devices.
Microsoft's Vision of Cloud Security
By Sean Michael Kerner | Security Article Published on April 21, 2015
Scott Charney, Corporate Vice-President of Microsoft's Trustworthy Computing, details what's wrong and what's right in security.
Security, Privacy Rank Among the Top IoT Concerns: CompuCom
By Pedro Hernandez | Security Article Published on April 03, 2015
A new survey reveals that IT professionals are apprehensive about security and data privacy as the Internet of Things continues to expand.
Hardening Ubuntu Security
By Matt Hartley | Security Article Published on March 23, 2015
For Ubuntu security, mind your ports – and remember that your web browser is a scary thing.
Average Large Enterprise Is Riddled with 2,400 Dodgy Mobile Apps: Veracode
By Pedro Hernandez | Security Article Published on March 11, 2015
Add secure MDM to the growing pile of enterprise IT priorities. Most large businesses have thousands of mobile apps that can be leaking data and putting their users at risk.
Google Boosts Security in Chrome 41
By Sean Michael Kerner | Security Article Published on March 05, 2015
Google is paying out $52,000 in security awards as part of the new browser release.
Trends in Data Protection: Prevention and Recovery
By Christine Taylor | Security Article Published on March 04, 2015
Current strategies for data protection focus on data loss prevention (DLP), storage system recovery, and data security.
Kaspersky MDM 'Knox' on Samsung Devices
By Pedro Hernandez | Security Article Published on March 02, 2015
The data security company adds Samsung Knox MDM and new self-service capabilities to its blended security-MDM platform.
Data Protection Trends 2015
By Christine Taylor | Security Article Published on January 14, 2015
An effective data protection plan encompasses data loss prevention (DLP), storage system recovery, and data security.
Shuttleworth Explains Why Open Source is More Secure than Closed Source [VIDEO]
By Sean Michael Kerner | Security Article Published on December 30, 2014
Mark Shuttleworth reflects on security issues of 2014 and the 10 years that Ubuntu Linux has existed.
Google Takes Steps to Improve Gmail Security
By Sean Michael Kerner | Security Article Published on December 18, 2014
Content Security Policy comes to Gmail as Google search considers flagging non SSL secured web sites.
Linux Malware vs Phishing Schemes
By Matt Hartley | Security Article Published on December 15, 2014
Are Linux users more threatened by malware or phishing schemes? The difference isn’t even close.
Can You Secure Your Business Intelligence Data in the Cloud?
By Guest Author | Security Article Published on October 22, 2014
Due diligence is one of the most important steps businesses can take before choosing a cloud computing provider.
MDM Falling Short in the Enterprise
By Pedro Hernandez | Security Article Published on September 24, 2014
A new study from Raytheon and the Ponemon Institute reveals that businesses and MDM vendors are still struggling to come to grips with BYOD.
IBM Boosts Cloud Resiliency
By Sean Michael Kerner | Security Article Published on September 23, 2014
With an eye toward the disaster recovery market, IBM opens its largest US-based cloud resiliency center.
Good Technology's MDM Is Primed for iPhone 6
By Pedro Hernandez | Security Article Published on September 18, 2014
The smartphone and its big brother the phablet will soon start flooding the workplace, but Good Technology claim to be ready.