dcsimg

Security - Article Archives - Page 1

BlackBerry SecuSuite And AtHoc Address Mobile Threats

April 25, 2018 |

In the wake of the many highly publicized breeches, Blackberry is offering solutions focused on security.

READ MORE

HP And the Importance Of An Integrated Privacy Screen

April 13, 2018 |

The privacy screen will grow to become one of the most powerful security features for notebooks and tablets.

READ MORE

Top 10 IoT Security Threats

January 30, 2018 |

Hackers have already proven that many of these IoT security attacks are possible.

READ MORE

Most Blockchain Projects Go Bust

November 10, 2017 |

Blockchain is one of the hottest trends in tech today but Deloitte discovers that most blockchain projects on GitHub fizzle out fast.

READ MORE

Digital Transformation Boosts IT Security Spending

March 30, 2017 |

IDC expects businesses' digital transformation initiatives to drive an increase in cybersecurity spending this year and beyond.

READ MORE

Data Privacy: 7 Trackers Collecting Your Personal Data

March 20, 2017 |

There’s data collection that creates great user experiences, then there’s data collection that takes place in the background without your consent.

READ MORE

Cisco's 2017 Cybersecurity Report: Things Are Much Worse

February 01, 2017 |

Attackers are moving fast, and enterprises are getting more security alerts than they can investigate.

READ MORE

Why Linux Installers Need to Add Security Features

January 18, 2017 |

With the heightened security concerns, Linux distros need to make basic security options prominently available in their installers rather than options that users can add manually later.

READ MORE

10 Most Surprising Tech News Stories of 2016

December 20, 2016 |

Big mergers, big hacks and big product recalls dominated the tech industry headlines last year.

READ MORE

Google Chrome 55 Fixes Flaws, Blocks Flash

December 05, 2016 |

Adobe Flash content will still run in Google'c Chrome 55 web browser, but users will need to specifically enable it.

READ MORE

Cloud Inspires Confidence in Disaster Recovery

November 23, 2016 |

IT managers who use cloud-based disaster recovery services sleep better at night than those who use on-premises solutions, according to a recent study from Zetta.

READ MORE

NewsletterDATAMATION DAILY NEWSLETTER

SUBSCRIBE TO OUR IT MANAGEMENT NEWSLETTER

Linux Security Made Simple

November 23, 2016 |

Linux security can be easier than you think. Here's a guide to reducing your Linux risks with a minimum of effort.

READ MORE

How to Create Bullet Proof Ubuntu Install

November 21, 2016 |

Learn how to protect your data in Ubuntu and restore to a working system should the unthinkable happen.

READ MORE

How to Secure Your Ubuntu Network

November 14, 2016 |

Ubuntu network security is certainly attainable, yet it requires some careful precautions.

READ MORE

Public Cloud Stokes Trust Issues

November 09, 2016 |

Businesses may be subscribing to cloud services in droves but many IT pros are increasingly casting a suspicious eye, a recent study from the SANS Institute shows.

READ MORE

Office 365: Yes, You Need Data Protection

October 20, 2016 |

Data protection for Office 365 is essential, despite the fact that 365 is hosted in the cloud.

READ MORE

Why Security Distributions Use Debian

October 19, 2016 |

Debian may not talk a lot about security, but then fish rarely talk about water, either.

READ MORE

Cybersecurity: Complexity is Our Biggest Vulnerability

October 04, 2016 |

Organizations have helplessly watched as the network perimeter, a key component in securing an organization from threats, has dissolved.

READ MORE

Hardware Firewall: Choosing the Right Firewall Distribution

October 03, 2016 |

A survey of firewall solutions reveals both complex and simple solutions that may work for your system.

READ MORE

IBM MaaS360 Goes Global for Mobile Data Privacy

September 14, 2016 |

The company's cloud-based enterprise mobility management platform is undergoing a global expansion, addressing the data privacy and sovereignty challenges faced by enterprises.

READ MORE