1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Effective cybersecurity is a highly mobile target, which makes threat information highly valuable for IT professions as they plan for which safeguards to implement. As eWeek columnist Robert Lemos recently noted, it can also serve as a justification for increases in data security spending. However, ...
Hits: 265
0
Despite stringent regulatory mandates, the healthcare industry has been an avid adopter of new technology. Mobility in particular has proven to be a boon for doctors and other hospital staff. For this reason, looking at IT implementations within healthcare organizations can serve as a good way to le...
Hits: 494
0

Posted by on in Virtualization
Cybercriminal tactics have evolved to not only become more efficient at stealing sensitive data, but better at hiding hacker activity while doing so. A recent white paper by research firm Frost & Sullivan discussed the risk of advanced cyber threats, noting that traditional information security ...
Hits: 347
0

Posted by on in Data Security
As 2012 draws to a close, many IT professionals are re-examining priorities and setting new goals. A recent InformationWeek survey found that tech decision makers ranked improving information security as their number one goal for the coming year. In response to the survey results, the publication of...
Hits: 291
0

Posted by on in Data Breach
This year was marked by a number of high-profile data breaches worldwide. While the U.S. experienced numerous incidents that shook the population's confidence in the ability of organizations to protect sensitive information, New Zealand companies and government agencies also came under fire for data...
Tagged in: Data Breach
Hits: 446
0