Many companies feel overwhelmed with the burden of covering all aspects of IT security, since growing network structures and factors — such as device proliferation and an increasingly mobile workforce — mean there are a greater number of systems and end-points that need to be secured than ever before.
Author: Information Security Buzz Editorial Staff
10x increase of secure browser activations and 9x increase of secure instant messaging activations in 2014 highlight shift to secure apps in the enterprise.
There’s no question that the Box IPO has validated the market demand for simple ways to share and collaborate on content.
Many of the most popular games out today are those that include, and heavily rely on, a multiplayer aspect.
David Fisk of Quorum relates how an organisation’s CryptoWall intrusion could have been different had instant recovery technology been in place.
Centrify Corporation, the leader in unified identity management across cloud, mobile and data centre, today announced the industry’s first privileged identity management solution for Apache Hadoop-based big data infrastructures, as well as partnerships with industry-leading big data vendors Cloudera, Hortonworks and MapR Technologies.
According to the BBC PC maker Lenovo has been forced to remove hidden adware that it was shipping on its laptops and PCs after users expressed anger.
As reported by a number of different sources, Google’s primary web property in Vietnam (www.google.com.vn) had its DNS abused by an individual (or individuals) claiming affiliation with Lizard Squad.
A new report from Intel Security reveals the latest persuasion techniques leveraged by cybercriminals to manipulate employees.
A global study of almost 2,100 contracts covering deals worth £7.8 billion suggests that Cloud-based services are failing to capture the popular imagination of UK businesses.