Despite a seemingly endless collection of stories about data breaches caused, in the end analysis, by the application of less-than-best practices in managing data, breaches of security continue to happen
Read MoreThe malware pair, already branded as cyber-armageden, have also prompted many of the anti-malware vendors to be show their public-spirited side and make available free tools to help track down and remove the malefactors before the day of reckoning
Read MoreAs one of the early contenders in the development of ID as a Service, Centrify now sees its potential as the focal point for IT departments providing policy-based, real-time management of most aspects of cloud security
Read MoreIBM’s Bluemix open cloud platform gets additional tools aimed at helping developers integrate front-end user engagement apps with the all-important back-office systems of record that are the heart and soul of every business
Read MoreThe anonymous team supporting the popular open source encryption software seems to have suddenly...
Read MoreGoogle’s fully automated cars may seem a novelty for now, but are likely to become the norm,...
Read MoreThe company puts significant development effort behind new security and management tools for mobile...
Read MoreCyber-criminals are getting smarter at targeting just the right individuals in order to obtain...
Read MoreBeing able to test new collaborative applications and services quickly and reliably has prompted...
Read MoreAnd pervasive network intelligence is the only answer, the company says
Read MoreA recent survey by CipherCloud , following Snowden, PRISM, Heartbleed and other security lapses,...
Read MoreDR specialist, Zerto, has devised a strategy for delivering complete choice for operating...
Read MoreCenturyLink introduces a Mitigation Appliance option for its DDoS Mitigation Service
Read MoreNach rund 2 Monaten der Beta-Phase wechselt das...
Read MoreDave LeClair, Senior Director of Strategy and Product Management of Stratus Technologies, outlines...
Read More