As enterprises are adopting cloud applications, the IT department is under tremendous pressure to ensure the security of the corporate data which is residing and travelling on third-party ...  more>>
Monday, February 10, 2014
No IT company is free from data breach ever since they came into existence. Data violation can be internal or external and it’s ...  more>>
Monday, February 10, 2014
We saw our industry mature on two fronts: First, it is becoming apparent to customers, analysts and vendors that protective security is not enough....  more>>
Monday, February 10, 2014
Amidst the alarming need for cloud security, Skyfence, a cloud security startup based in the U.S. has started using user’s behavior as a tool to enhance the security services...  more>>
Tuesday, February 11, 2014
The Cyber Risk Report 2013, developed by HP Security Research, provides exhaustive data and analysis around the most critical and crucial issues hounding enterprises. The report offers factors ...  more>>
Tuesday, February 11, 2014
The movement of Bring Your Own Device (BYOD) is making managers in IT companies adapt themselves to deal with a large number of employees using their smartphones and tablets on the ...  more>>
Tuesday, February 11, 2014
Cloud-based security services to increase due to incorporation of services by Small and Medium Businesses (SMBs) that lack the internal IT resources to combat threats predicts a recent Gartner report “Market ...  more>>
Tuesday, February 11, 2014
Splunk, an American multinational corporation which produces software for searching, monitoring, and analyzing machine-generated big data, via a web-style interface has released a new app which helps the security professionals to fight back hackers with new visualization technology. ...  more>>
Wednesday, February 12, 2014
Kaspersky announced that it has identified a cyber-criminal group that is believed to be spying with the help of the most advanced malicious software or malware. Inquirer reported that the software identified as “Careto”, ...  more>>
Wednesday, February 12, 2014
The U.S. cybersecurity Framework which was created as a response to President Barack Obama‘s executive order “Improving Critical Infrastructure Cybersecurity” has been welcomed by BSA, ...  more>>
Friday, February 14, 2014
<<Previous  1   2   3   5   6   7   8   Next>>