Security Index

Cloud Inspires Confidence in Disaster Recovery
By Pedro Hernandez | Security Article Published on November 23, 2016
IT managers who use cloud-based disaster recovery services sleep better at night than those who use on-premises solutions, according to a recent study from Zetta.
Linux Security Made Simple
By Bruce Byfield | Security Article Published on November 23, 2016
Linux security can be easier than you think. Here's a guide to reducing your Linux risks with a minimum of effort.
How to Create Bullet Proof Ubuntu Install
By Matt Hartley | Security Article Published on November 21, 2016
Learn how to protect your data in Ubuntu and restore to a working system should the unthinkable happen.
How to Secure Your Ubuntu Network
By Matt Hartley | Security Article Published on November 14, 2016
Ubuntu network security is certainly attainable, yet it requires some careful precautions.
Public Cloud Stokes Trust Issues
By Pedro Hernandez | Security Article Published on November 09, 2016
Businesses may be subscribing to cloud services in droves but many IT pros are increasingly casting a suspicious eye, a recent study from the SANS Institute shows.
Office 365: Yes, You Need Data Protection
By Guest Author | Security Article Published on October 20, 2016
Data protection for Office 365 is essential, despite the fact that 365 is hosted in the cloud.
Why Security Distributions Use Debian
By Bruce Byfield | Security Article Published on October 19, 2016
Debian may not talk a lot about security, but then fish rarely talk about water, either.
Cybersecurity: Complexity is Our Biggest Vulnerability
By Guest Author | Security Article Published on October 04, 2016
Organizations have helplessly watched as the network perimeter, a key component in securing an organization from threats, has dissolved.
Hardware Firewall: Choosing the Right Firewall Distribution
By Matt Hartley | Security Article Published on October 03, 2016
A survey of firewall solutions reveals both complex and simple solutions that may work for your system.
IBM MaaS360 Goes Global for Mobile Data Privacy
By Pedro Hernandez | Security Article Published on September 14, 2016
The company's cloud-based enterprise mobility management platform is undergoing a global expansion, addressing the data privacy and sovereignty challenges faced by enterprises.
5 Best Linux Distros for Security
By Bruce Byfield | Security Article Published on August 29, 2016
Linux distros have has long emphasized security and related matters like firewalls, penetration testing, anonymity, and privacy. These distributions pay special attention to security.
Kaminsky Advocates for Greater Cloud Security
By Sean Michael Kerner | Security Article Published on August 10, 2016
[VIDEO] In a press conference at the Black Hat USA security event, researcher Dan Kaminsky detailed why the cloud isn't just about convenience.
What CIOs Should Know About Blockchain
By Pedro Hernandez | Security Article Published on August 04, 2016
Another day, another technology trend. Before diving in head first, here's what Gartner has to say about the blockchain revolution.
IoT Security: What IoT Can Learn From Open Source
By Bruce Byfield | Security Article Published on July 05, 2016
Businesses are hugely concerned about IoT security, yet nothing indicates that IoT security levels have improved in the last few years.
Employee Privacy Succumbs to MDM
By Pedro Hernandez | Security Article Published on June 24, 2016
An experiment conducted by Bitglass reveals that mobile device management software can potentially give employers an unprecedented look into their workers' personal lives.
The Internet of Things: 7 Challenges
By Bruce Byfield | Security Article Published on June 15, 2016
IoT, along with its potential, poses concerns ranging from technical to social to environmental.
Datos IO Debuts RecoverX for Cloud Data Protection
By Sean Michael Kerner | Security Article Published on June 10, 2016
Performing backup and recovery for distributed data in the cloud requires distributed consensus.
IoT Security Issues: How to Secure the Network
By Andy Patrizio | Security Article Published on June 07, 2016
IoT security is a patchwork, even as countless devices getting added. Here are tips for securing your IoT deployment amid the challenges.
Let's Encrypt: The Good and the Bad
By Matt Hartley | Security Article Published on May 16, 2016
The Let’s Encrypt initiative is a well-intentioned security solution, yet it does prompt some questions.
Big Data and Security Dominate IoT Buzz on Twitter
By Pedro Hernandez | Security Article Published on April 21, 2016
A social media analysis by Argus Insights reveals that the massive amounts of data generated by the IoT and concerns about data security are hot topics on Twitter.