1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Recent blog posts
Cloud security has become a point of contention as IT departments struggle with ensuring corporate data is protected and vendors provide assurances that their architectures are safe. Although there is still some debate over whether the cloud is truly secure, a significant number of businesses have a...
Hits: 281
0

Posted by on in Virtualization
Cybercriminal tactics have evolved to not only become more efficient at stealing sensitive data, but better at hiding hacker activity while doing so. A recent white paper by research firm Frost & Sullivan discussed the risk of advanced cyber threats, noting that traditional information security ...
Hits: 347
0

Posted by on in Data Security
As 2012 draws to a close, many IT professionals are re-examining priorities and setting new goals. A recent InformationWeek survey found that tech decision makers ranked improving information security as their number one goal for the coming year. In response to the survey results, the publication of...
Hits: 291
0
Bring-your-own-device has complicated the data security ecosystem significantly, as information moves from company-provisioned and managed devices to personal smartphones and tablets. The trend has afforded workers extended mobility and access to corporate resources from anywhere, but it has also gi...
Hits: 491
0
A recent survey of 250 senior IT decision makers in the U.K. found that, although 84 percent claimed they were concerned or very concerned about IT security breaches, 55 percent have not tested the security systems and procedures of cloud vendors. The study, conducted by IT recruitment consultancy R...
Hits: 544
0