Please turn on your JavaScript for this page to function normally.
The safest cloud apps for the enterprise

Enterprises today no longer have a choice about whether they embrace the cloud as their employees are already using cloud apps to perform critical business functions, often …

1Password 4 for Mac released

1Password, the most popular password manager for the Mac, has been updated today with the launch of version 4. Great news for Mac App Store customers as all of them will …

The Internet of Things will change everything

The Internet of Things (IoT) represents a new construct in the ICT world that is occupying the minds of IT vendors, service providers, and systems integrators as it represents …

Silk Road taken down, owner arrested

Silk Road, the infamous black market drug website hidden in the so-called Deep Web, has been taken down, and its founder and owner arrested and charged for conspiracy to …

Are workers drowning in a sea of ineffective technology?

With the rise of mobile, the cloud and multiple device use, today’s workers are more connected than ever before, giving them access to high-volume streams of information …

Bruce Schneier: The battle for power on the Internet

Bruce Schneier gives us a glimpse of the future of the internet, and shares some of the context we should keep in mind, and the insights we need to understand, as we prepare for it.

Technology eliminates bot-infected traffic from advertising campaigns

White Ops introduced a systematic solution for eliminating bot-infected traffic from advertising campaigns. “We have spent over a year tracking the bad guys attacking …

Aruba Networks releases cloud Wi-Fi solution

Aruba Networks announced a new cloud-managed Wi-Fi solution that combines the simplicity of a cloud service with the performance, manageability and reliability of …

McAfee solution remediates advanced malware

McAfee announced an end-to-end solution to help organizations combat the increasing challenges of advanced malware. McAfee goes beyond single-feature, static analysis …

Is wireless the Trojan horse in your network security?

According to Roger Klorese of WatchGuard technologies, smartphones and tablets now account for about 25% of devices used for work in the US. Wireless, mobility and BYOD are …

Could the EU cyber security directive cost companies billions?

Many of the world’s largest enterprises are not prepared for the new European Union Directive on cyber security, which states that organizations that do not have …

Connections between personality types and phishing

Phishing scams are some of the most effective online swindles, hooking both savvy and naive computer users. New insights from researchers at the Polytechnic Institute of New …

Don't miss

Cybersecurity news