Cloud computing as key to improved data protection
More than half (55%) of U.S. organizations expect their use of the cloud to increase as part of their business continuity strategy over the next year, according to CA. …
IT is embracing BYOD
IT is accepting, and in some cases embracing, “bring your own device” (BYOD) as a reality in the enterprise. A new Cisco study shows some of the quantifiable …
Online travel most vulnerable to email attacks
Agari released its first TrustIndex, a quarterly measurement that applies Agari’s big data insights to score email attack vulnerability and email trust by industry. …
Microsoft shows cloud computing security benefits
Small and midsize businesses (SMBs) are gaining significant IT security benefits from using the cloud, according to a new Microsoft study in five geographies. The study shows …
IT candidates should shift career perspectives
Recruiting in the technology sector is strong, despite weaknesses and structural changes the economy has experienced over the past several years. Enterprises seem to be …
Americans are less concerned about security
Americans are less concerned about nearly all aspects of security than they were 12 months ago, but an overwhelming majority consider security issues very important when …
Do mobile devices in the workplace create security problems?
The role of IT managers has changed drastically in a short period of time – revolutionized by smart mobile devices and increased remote connection tools. While end users …
Phishing impersonating email service providers spikes
Phishing attacks impersonating email service providers increased 333 percent from Q4 2011 to Q1 2012. IID attributes this spike to spammers needing unsullied email addresses …
Cisco explores the state of cloud networking
As the role of cloud computing is growing significantly in its ability to deliver business applications, many IT decision makers are facing challenges with their existing …
Cybercriminals are exploiting users of social networking sites
In April, cybercriminals were seen exploiting users of major social networking sites in order to spread malware and spam surveys, according to GFI Software. “In the same …
The personal cloud will eclipse the PC
The personal cloud is poised to eclipse the PC as the hub of consumers’ digital lives by 2014 as rapid growth in the use of apps and services introduces a new paradigm …
Healthcare concerns over data loss increase
While approaches to patient data protection have evolved over the past several years, the aggressive transition to electronic health records (EHR) and the consumerization of …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does