Sophos and Check Point Blend MDM and VPNBy Pedro Hernandez
| Security Article Published on August 26, 2014
The data security companies partner to keep unauthorized and non-compliant devices out of corporate networks.
Wearables Stoke Privacy ConcernsBy Pedro Hernandez
| Security Article Published on August 21, 2014
A majority of consumers are wary of about the privacy implications of wearable devices and the data they collect.
Issues in Mobile Device BackupBy Christine Taylor
| Security Article Published on August 04, 2014
Mobile device backup is making big strides as companies get a handle on file sharing, governance, global deduplication and other key concerns.
Security, the Edward Snowden WayBy Mike Elgan
| Security Article Published on July 23, 2014
Security applications recommended by Edward Snowden – who probably knows as much about Internet privacy as anyone.
Study: IT Lacks Faith in Cloud ProvidersBy Andy Patrizio
| Security Article Published on June 26, 2014
IT and security professionals expect cloud services to increase the likelihood and economic impact of data breaches.
Is Desktop Linux Secure?By Matt Hartley
| Security Article Published on May 13, 2014
In the wake of Heartbleed, is the Linux desktop truly safe?
Why is Cloud Data Security Still Lackluster?By David Linthicum
| Security Article Published on May 01, 2014
Until best practices are applied far more broadly, data security remains an issue as we migrate to cloud-based platforms.
Google Chrome 34 Gets ResponsiveBy Sean Michael Kerner
| Security Article Published on April 09, 2014
Google's upgrade to its Chrome web browser includes support for responsive images and fixes for 31 security issues.