Please turn on your JavaScript for this page to function normally.
Fluke Networks increases BYOD device visibility

Fluke Networks announced a new BYOD Classification capability that reduces the cost and time needed to optimize and secure a wireless network for authorized and unauthorized …

Looking to the future: Security predictions for 2013

The door is closing on 2012, and it’s time to look ahead to next year. As you round out your 2013 business and IT plans, cybercriminals are resolving to implement …

Reinvent your security approach

Tasked with ensuring the success of business-changing IT initiatives from mobile and BYOD to virtualization and cloud services, IT security is finding that existing security …

5 cloud myths that will be debunked in 2013

There are a lot of common misconceptions and myths related to cloud computing. Many think of the cloud as less secure and reliable than on premise solutions, when in reality …

Proprietary platforms to cause complexity in 2013

Citrix predicts that the rise of consumerisation and the Bring-Your-Own (BYO) phenomenon will force IT departments to focus on the challenge of apps and data governance. 2012 …

Wi-Fi operating system ArrayOS gets new features

Wick Hill announced a new release of the ArrayOS operating system for Xirrus Wireless Arrays. Xirrus AOS 6.3 provides an advanced Wi-Fi operating system for optimizing the …

Risk study identifies top pain points in 2013

The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute. IT professionals reported the flood of mobile devices …

Three major impacts when moving to a BYOD policy

Seventy percent of respondents in a recent survey by Gartner, Inc. said that they have or are planning to have BYOD policies within the next 12 months to allow employees to …

Employees use file sharing services despite bans

Large numbers of employees use Dropbox and other consumer file sharing services for sensitive work-related data, even if they know that their employer has a specific policy …

Mobile and cloud developments will dominate 2013

For the past several years, the IT industry’s transition to the 3rd Platform, built on mobile computing, cloud services, social networking, and big data analytics …

Top 5 security threats for 2013

The Information Security Forum announced their forecast of the top five security threats businesses will face in 2013. Key threats include cyber security, supply chain …

Panorama9 unveils patch management for Mac

Managing mixed OS environments is an especially pressing concern for technology startups, which have been on the leading edge of adopting more relaxed BYOD policies. IT …

Don't miss

Cybersecurity news