Please turn on your JavaScript for this page to function normally.
Tips for network administrators as mobile device usage increases

The increase in mobile device has resulted in network challenges for businesses of all types and sizes. According to the Monetate Q1 2013 Ecommerce Quarterly, tablets have …

UEFI secure boot: Next generation booting or a controversial debate

One of the first initiatives for secure booting has been the Unified Extensible Firmware Interface (UEFI) Initiative. UEFI is a superior replacement of the Basic Input Output …

Cloud strategy and evaluation considerations

Wisegate, a private, practitioner-based IT research service for qualified senior technology professionals, released a new industry case study designed to help IT professionals …

Identity and access management tips for proactive compliance

N8 Identity announced eight tips for proactive compliance through identity and access management (IAM) best practices. These tips offer advice to organizations seeking to …

Selecting a cloud provider starts with exit planning

Let’s begin with a story: The first day of the new week started very ordinarily and nothing indicated this was going to be a very long and tiring day for Sarah, a CIO of …

Protect your company from BYOD security threats

With users wanting to connect their personally owned computers to corporate infrastructure, IT admins have to find the right balance between providing services, and securing …

Combating attacks with collaborative threat intelligence

Advanced Persistent Attacks (APTs) get most of the attention from the cyber security community because, as defenders, we want to be vigilant against the most insidious …

Bruce Schneier on power and security

In this video, Bruce Schneier talks about trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. …

Can you trust your online backup service?

While having lots of digital storage space at your physical location may be cheap nowadays, it’s also very useful to have offsite backups – not only in the event …

Creating a cloud security policy

Building a cloud security policy is a crucial step to take before diving into the cloud to ensure maximum benefits are achieved and data is secure. But some organizations, in …

How big data is transforming information security

In this video recorded at Hack In The Box 2013 Amsterdam, Eddie Schwartz, CSO at RSA, The Security Division of EMC, discusses the impact of big data on information security. …

DDoS attacks: What they are and how to protect yourself

Ameen Pishdadi is the CTO at GigeNET. In this interview he discusses the various types of DDoS attacks, tells us who is at risk, tackles information gathering during attacks, …

Don't miss

Cybersecurity news