The flexibility and scalability of the cloud can make migrating mission-critical applications a tempting proposition, but availability can become a serious issue.
For the second year in a row, social media sites (including gaming and dating sites) are leading the way in consumer security and privacy protections, beating out Internet retailers and banks, according to an annual comprehensive audit by the Online Trust Alliance (OTA).
Signature-based blacklisting security technologies are losing the battle against malware, says McAfee, which has streamlined its endpoint security offerings to two suites that it says provide next-generation security for all endpoints, whether PCs, tablets or ATMs.
Is Google Glass a gimmick or the next revolution in post-PC computing? Time will be the judge, because the head-mounted augmented reality device isn't even widely available yet.
Since 2011, security firm Blue Coat Systems has been tracking malnets: extensive distributed network infrastructures embedded in the Internet and designed to deliver mass-market attacks on a continuous basis. These malnet infrastructures are like the proverbial Lernaean Hydra--chop off one head, like a botnet it has produced, and two more spring up to take its place.
Hoping to unleash a wave of developer creativity in financial apps, Intuit is giving developers access to the financial data service that powers Quicken, QuickBooks and Mint.com.
Friday marks the end of an era, as outgoing VMware CEO Paul Maritz hands the reins to incoming CEO Pat Gelsinger.
Your sensitive data is only as secure as the weakest link in your organization, and in many cases the weak link is your employees.
Are you doing enough to secure your organization's sensitive information?
IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem. But a number of mobile security vendors believe organizations are focusing the device when they should be focusing on the data.
A number of high-profile Amazon Web Services (AWS) outages temporarily brought down services by customers like Netflix and Pinterest in June.
Managing devices in a BYOD environment is no mean feat, and the right mobile device management (MDM) product can be a key component in making it work. Here are 10 leading MDM products on the market today.
The European Union is considering sweeping new data protection laws that would mandate many organizations in Europe formally appoint a Data Protection Officer (DPO). To get ahead of the potential high demand for qualified candidates, organizations should consider defining their needs now.
Big changes are coming to data protection laws in the European Union. Are you ready?
The latest Internet Security Threat Report by Symantec finds that targeted attacks are becoming more common and are going beyond the public sector and large enterprises to smaller, less well defended companies in the supply chain and partner ecosystem.
Articles by Thor OlavsrudNext Page