Security Index

IBM MaaS360 Goes Global for Mobile Data Privacy
By Pedro Hernandez | Security Article Published on September 14, 2016
The company's cloud-based enterprise mobility management platform is undergoing a global expansion, addressing the data privacy and sovereignty challenges faced by enterprises.
5 Best Linux Distros for Security
By Bruce Byfield | Security Article Published on August 29, 2016
Linux distros have has long emphasized security and related matters like firewalls, penetration testing, anonymity, and privacy. These distributions pay special attention to security.
Kaminsky Advocates for Greater Cloud Security
By Sean Michael Kerner | Security Article Published on August 10, 2016
[VIDEO] In a press conference at the Black Hat USA security event, researcher Dan Kaminsky detailed why the cloud isn't just about convenience.
What CIOs Should Know About Blockchain
By Pedro Hernandez | Security Article Published on August 04, 2016
Another day, another technology trend. Before diving in head first, here's what Gartner has to say about the blockchain revolution.
IoT Security: What IoT Can Learn From Open Source
By Bruce Byfield | Security Article Published on July 05, 2016
Businesses are hugely concerned about IoT security, yet nothing indicates that IoT security levels have improved in the last few years.
Employee Privacy Succumbs to MDM
By Pedro Hernandez | Security Article Published on June 24, 2016
An experiment conducted by Bitglass reveals that mobile device management software can potentially give employers an unprecedented look into their workers' personal lives.
The Internet of Things: 7 Challenges
By Bruce Byfield | Security Article Published on June 15, 2016
IoT, along with its potential, poses concerns ranging from technical to social to environmental.
Datos IO Debuts RecoverX for Cloud Data Protection
By Sean Michael Kerner | Security Article Published on June 10, 2016
Performing backup and recovery for distributed data in the cloud requires distributed consensus.
IoT Security Issues: How to Secure the Network
By Andy Patrizio | Security Article Published on June 07, 2016
IoT security is a patchwork, even as countless devices getting added. Here are tips for securing your IoT deployment amid the challenges.
Let's Encrypt: The Good and the Bad
By Matt Hartley | Security Article Published on May 16, 2016
The Let’s Encrypt initiative is a well-intentioned security solution, yet it does prompt some questions.
Big Data and Security Dominate IoT Buzz on Twitter
By Pedro Hernandez | Security Article Published on April 21, 2016
A social media analysis by Argus Insights reveals that the massive amounts of data generated by the IoT and concerns about data security are hot topics on Twitter.
Cloud Servers Are More Secure Than Your Data Center. Here's Why.
By Guest Author | Security Article Published on March 29, 2016
Without the expertise, experience and security commitment a cloud vendor, your company's data center is unlikely to match the cloud for security.
Black Duck Aims to Help Improve Open Source Code Visibility
By Sean Michael Kerner | Security Article Published on March 10, 2016
VIDEO: Bill Ledingham, CTO of BlackDuck, discusses the risks and opportunities of open source software development.
Security and Analytics Among the Top Emerging IoT Trends
By Pedro Hernandez | Security Article Published on February 23, 2016
Gartner lists the top ten most impactful Internet of Things technologies for 2017 and 2018.
AirWatch 8.3 Champions User Privacy
By Pedro Hernandez | Security Article Published on February 17, 2016
The latest update addresses a concern among users: the fear that employers are using mobile device management to spy on them.
Security and Analytics to Dominate IoT Buzz in 2016
By Pedro Hernandez | Security Article Published on February 12, 2016
Safeguarding and drawing business-boosting insights from Internet of Things data will be priorities for CIOs as the market takes off this year.
Cyber Insecurity In 2016: We Are Not Ready
By Rob Enderle | Security Article Published on January 21, 2016
Tech security remains a very real worry as we head into the new year.
Public Clouds and Disaster Recovery
By Christine Taylor | Security Article Published on December 08, 2015
Using public clouds for disaster recovery requires sifting through many vendor offerings and possible solutions. It’s also essential to examine your own priorities.
BlackBerry Leaving Pakistan over Government Monitoring
By Pedro Hernandez | Security Article Published on November 30, 2015
The device maker and MDM provider is readying its exit from the country due to government demands for a "back doors" into its messaging platforms.
Enterprises are Hoarding 'Dark' Data: Veritas
By Pedro Hernandez | Security Article Published on October 30, 2015
Businesses are losing track of their data, causing storage costs to mount and placing organizations at risk.