SoftWatch solutions to the SMB market are aimed to support smooth transition from MS Office to cloud based office and…
Browsing: Cloud Security
Cybersecurity is top of mind for everyone storing their files, pictures and sensitive information on the cloud. Every cloud service…
The GoDaddy customer breaches didn’t have to happen and don’t have to happen to you.
Hybrid Cloud Adoption is Preferred; Control and Security of Data is Top Concern Many financial firms are slowly putting more…
As the undisputed global leader in technological innovation, it has always been shocking to me that Silicon Valley doesn’t lead…
Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify and remediate threats and boost collaboration between Security…
Kai Roer highlights the underlying cause for many successful and easily preventable attacks in his book “Build a Security Culture.”
Rick Delgado weighs in on what priorities IT security teams will focus on in 2015.
Qualys, Inc. has announced that its security research team found a critical vulnerability in the Linux GNU C Library (glibc) called GHOST.
Jon Oberheide of Duo Security discusses Google’s decision to warn users about SHA-1 certificates in the Chrome web browser.