Security Index

Cyber Insecurity In 2016: We Are Not Ready
By Rob Enderle | Security Article Published on January 21, 2016
Tech security remains a very real worry as we head into the new year.
Public Clouds and Disaster Recovery
By Christine Taylor | Security Article Published on December 08, 2015
Using public clouds for disaster recovery requires sifting through many vendor offerings and possible solutions. It’s also essential to examine your own priorities.
BlackBerry Leaving Pakistan over Government Monitoring
By Pedro Hernandez | Security Article Published on November 30, 2015
The device maker and MDM provider is readying its exit from the country due to government demands for a "back doors" into its messaging platforms.
Enterprises are Hoarding 'Dark' Data: Veritas
By Pedro Hernandez | Security Article Published on October 30, 2015
Businesses are losing track of their data, causing storage costs to mount and placing organizations at risk.
Half of IT Pros Fear They're Harboring a Hidden Internet of Things: ISACA
By Pedro Hernandez | Security Article Published on October 16, 2015
Giving new meaning to shadow IT, ISACA finds that many U.S. businesses may be operating IoT tech without properly accounting for it.
Top Tips For Android Security
By Matt Hartley | Security Article Published on September 21, 2015
Perfect Android security isn’t possible, but Android users can do a lot to bulk up their Android device.
Google Chrome Turns Seven, Advances with Security and Performance Gains
By Sean Michael Kerner | Security Article Published on September 03, 2015
Chrome 45 patches 29 flaws , while the new Chrome 46 bets offers the promise of improved loading performance.
Flouting Risks, IT Pros Embrace IoT Tech: Tripwire
By Pedro Hernandez | Security Article Published on August 21, 2015
They should really know better: A majority of IT professionals are introducing smart devices into their corporate networks despite policies against the practice.
Linux Concerns: Convenience vs. Security
By Bruce Byfield | Security Article Published on August 10, 2015
Is Linux secure? Only if you work at it.
Personal Clouds Are Casting Their Shadows over Enterprise IT
By Pedro Hernandez | Security Article Published on August 07, 2015
Businesses are facing new IT management challenges as employees embrace cloud services that span across their personal and work lives, according to Gartner.
IoT Security Market to Reach Nearly $29 Billion by 2020
By Pedro Hernandez | Security Article Published on August 06, 2015
The future looks bright for IT security vendors, particularly those that use the cloud to shield Internet of Things data from prying eyes.
ARM Acquires Sansa Security for Hacker-Resistant IoT
By Pedro Hernandez | Security Article Published on August 03, 2015
The mobile processor giant snaps up the Israeli security company to help safeguard IoT devices.
Microsoft's Vision of Cloud Security
By Sean Michael Kerner | Security Article Published on April 21, 2015
Scott Charney, Corporate Vice-President of Microsoft's Trustworthy Computing, details what's wrong and what's right in security.
Security, Privacy Rank Among the Top IoT Concerns: CompuCom
By Pedro Hernandez | Security Article Published on April 03, 2015
A new survey reveals that IT professionals are apprehensive about security and data privacy as the Internet of Things continues to expand.
Hardening Ubuntu Security
By Matt Hartley | Security Article Published on March 23, 2015
For Ubuntu security, mind your ports – and remember that your web browser is a scary thing.
Average Large Enterprise Is Riddled with 2,400 Dodgy Mobile Apps: Veracode
By Pedro Hernandez | Security Article Published on March 11, 2015
Add secure MDM to the growing pile of enterprise IT priorities. Most large businesses have thousands of mobile apps that can be leaking data and putting their users at risk.
Google Boosts Security in Chrome 41
By Sean Michael Kerner | Security Article Published on March 05, 2015
Google is paying out $52,000 in security awards as part of the new browser release.
Trends in Data Protection: Prevention and Recovery
By Christine Taylor | Security Article Published on March 04, 2015
Current strategies for data protection focus on data loss prevention (DLP), storage system recovery, and data security.
Kaspersky MDM 'Knox' on Samsung Devices
By Pedro Hernandez | Security Article Published on March 02, 2015
The data security company adds Samsung Knox MDM and new self-service capabilities to its blended security-MDM platform.