Please turn on your JavaScript for this page to function normally.
IoT architectures to impact analytics, stakeholders and infrastructure

The opportunity of the Internet of Things (IoT) has everything to do with data. By distributing and diversifying data, IoT architectures will dramatically impact analytics, …

5 tips to avoid identity theft

“Tax fraud is widespread and happening as you read this,” says security and identity theft expert for Credit Sesame, Neal O’Farrell. “In the first week …

Lepide Software launches LepideMigrator for Exchange

LepideMigrator for Exchange is a one-stop solution that migrates all user mailboxes, public folders and archive mailboxes along with their content and resources from an …

3 ways to advocate for data security at your company

There’s an unfortunate tendency among many businesses to rank data security well below other functions. It’s a familiar story: firms slash resources at the first …

Third-party security now a top business concern

Forrester found that when it comes to tracking third-party risk, critical data loss or exposure (63 percent) and the threat of cyber attacks (62 percent) ranked as the top …

A proactive approach to DDoS attack prevention

The increase in the frequency, volume and sophistication of DDoS attacks has helped boost the awareness of these threats among Asia-Pacific (APAC) enterprises. New analysis …

What’s the most common security threat for an organization?

IT professionals believe their organizations aren’t doing enough to protect critical data and systems, according to Sungard Availability Services. What is triggering …

How directors manage today’s key challenges

A nationwide survey of nearly 500 directors highlighted that daily risk oversight continues to be one of the central challenges facing boards, as well as an increased focus on …

Mass infection malware attack targets Android

AdaptiveMobile uncovered one of the single largest messaging-initiated mobile malware outbreaks. The malware, dubbed Gazon, which uses victims’ mobile phone contacts to …

Firewall: The king of network security

A new FireMon report, based on a survey of over 700 network security practitioners, reveals that firewalls remain highly strategic to organizations’ current and future …

Global experiment exposes the dangers of using Wi-Fi hotspots

A global Wi-Fi hacking experiment exposed major security issues regarding the browsing habits of users around the globe. Avast mobile security experts traveled to cities in …

Security threats and the retail industry

Only 18 percent of retail IT security professionals are concerned that point of sale devices are being targeted by cyber criminals, and only 20 percent are …

Don't miss

Cybersecurity news