IBM MaaS360 Goes Global for Mobile Data PrivacyBy Pedro Hernandez
| Security Article Published on September 14, 2016
The company's cloud-based enterprise mobility management platform is undergoing a global expansion, addressing the data privacy and sovereignty challenges faced by enterprises.
5 Best Linux Distros for SecurityBy Bruce Byfield
| Security Article Published on August 29, 2016
Linux distros have has long emphasized security and related matters like firewalls, penetration testing, anonymity, and privacy. These distributions pay special attention to security.
Kaminsky Advocates for Greater Cloud SecurityBy Sean Michael Kerner
| Security Article Published on August 10, 2016
[VIDEO] In a press conference at the Black Hat USA security event, researcher Dan Kaminsky detailed why the cloud isn't just about convenience.
What CIOs Should Know About BlockchainBy Pedro Hernandez
| Security Article Published on August 04, 2016
Another day, another technology trend. Before diving in head first, here's what Gartner has to say about the blockchain revolution.
IoT Security: What IoT Can Learn From Open SourceBy Bruce Byfield
| Security Article Published on July 05, 2016
Businesses are hugely concerned about IoT security, yet nothing indicates that IoT security levels have improved in the last few years.
Employee Privacy Succumbs to MDMBy Pedro Hernandez
| Security Article Published on June 24, 2016
An experiment conducted by Bitglass reveals that mobile device management software can potentially give employers an unprecedented look into their workers' personal lives.
The Internet of Things: 7 ChallengesBy Bruce Byfield
| Security Article Published on June 15, 2016
IoT, along with its potential, poses concerns ranging from technical to social to environmental.
IoT Security Issues: How to Secure the NetworkBy Andy Patrizio
| Security Article Published on June 07, 2016
IoT security is a patchwork, even as countless devices getting added. Here are tips for securing your IoT deployment amid the challenges.
Let's Encrypt: The Good and the BadBy Matt Hartley
| Security Article Published on May 16, 2016
The Let’s Encrypt initiative is a well-intentioned security solution, yet it does prompt some questions.
Big Data and Security Dominate IoT Buzz on TwitterBy Pedro Hernandez
| Security Article Published on April 21, 2016
A social media analysis by Argus Insights reveals that the massive amounts of data generated by the IoT and concerns about data security are hot topics on Twitter.
AirWatch 8.3 Champions User PrivacyBy Pedro Hernandez
| Security Article Published on February 17, 2016
The latest update addresses a concern among users: the fear that employers are using mobile device management to spy on them.
Security and Analytics to Dominate IoT Buzz in 2016By Pedro Hernandez
| Security Article Published on February 12, 2016
Safeguarding and drawing business-boosting insights from Internet of Things data will be priorities for CIOs as the market takes off this year.
Public Clouds and Disaster RecoveryBy Christine Taylor
| Security Article Published on December 08, 2015
Using public clouds for disaster recovery requires sifting through many vendor offerings and possible solutions. It’s also essential to examine your own priorities.