Please turn on your JavaScript for this page to function normally.
Embracing BYOD means understanding cloud and application security

Company policies supporting Bring Your Own Device are being widely embraced as a win-win initiative that improves employees’ experience and reduces IT costs, according …

Microsoft advances the Cloud OS

Microsoft announced new solutions to help enterprise customers manage hybrid cloud services and connected devices. System Center 2012 SP1, the enhanced Windows Intune, Windows …

Tokenless authentication comes to the cloud

SecurEnvoy has partnered with PasswordBank to bring the leading tokenless two-factor authentication capabilities to the PasswordBank identity management offering. Customers …

Fortinet introduces a new security blade

Fortinet announced the FortiGate-5001C blade, which provides large data centers as well as private and hybrid cloud deployments with consolidated security capabilities. The …

Vulnerability management in the cloud from Dell SecureWorks

Dell SecureWorks announces a new Vulnerability Management Service (VMS) and a new Web Application Scanning (WAS) Service for the Cloud. These add-on Cloud security solutions …

Rapid-fire changes to information security strategies

RSA released a special report from the Security for Business Innovation Council (SBIC) that assesses how disruptive innovations such as Big Data analytics, cloud computing, …

The threat landscape continues to expand rapidly

ThreatMetrix announced cybersecurity trends and risks businesses and consumers must keep top of mind in 2013. These include cyberwarfare, data breaches, migrating malware, …

Guidance on cybersecurity, private clouds and privacy

ISACA today issued guidance on managing three top trends posing major challenges to businesses in 2013: cybersecurity threats, private vs. public clouds and data privacy. …

Cloud exploits and mobile device attacks on the horizon

Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber …

Get ready for invited break-ins, malware-ridden apps and spoof attacks

It’s that time of year again when, it seems, every technology vendor suddenly becomes clairvoyant with an insatiable urge to predict the battles we need to arm ourselves …

Looking to the future: Security predictions for 2013

The door is closing on 2012, and it’s time to look ahead to next year. As you round out your 2013 business and IT plans, cybercriminals are resolving to implement …

Total Defense launches coud security solution

Total Defense announced Total Defense for Business, a solution that combines cloud computing with the delivery of multi-layered protection through the integration of various …

Don't miss

Cybersecurity news