|
eGuide: Citrix Systems The mobile workforce is here to stay, but many IT organizations still lack a mobile security strategy that comprises both PCs and mobile devices-and the applications and data on those devices. As one of our writer's asks, what are these enterprises waiting for? Read More ▶ |
The recent Internet of Things-based DDoS attack on Dyn heralded the beginning of a new era for businesses. For better or for worse, industry experts’ warnings about the need to consider all “endpoints” rather than limiting security efforts to workstations and servers were vindicated. Read More ▶ |
|
Law enforcement agencies have dismantled a major cybercriminal network responsible for malware-based attacks that have been harassing victims across the globe for years. Read More ▶ |
|
A new Android malware has managed to steal access to more than 1 million Google accounts, and it continues to infect new devices, according to security firm Checkpoint. Read More ▶ |
|
|
IBM says common Session Initiation Protocol (SIP) and SIP and Cisco Skinny Client Control Protocol (SCCP) are most common targets. Read More ▶ |
|
Spirion CEO Jo Webber offers examples of how the education vertical can leverage data classification to reduce the risk of data theft and costly compliance violations. Read More ▶ |
|
A new survey sheds some light on just how little grasp U.S. organizations have on privacy and security regulations. Read More ▶ |
|
Amazon Web Services is trying to help protect its customers with a new service aimed at mitigating DDoS impacts. It’s called Shield, and the entry-level tier is enabled by default for all web applications running on AWS, starting on Wednesday. Read More ▶ |
|
Here's what data each telemetry level collects and the price you pay to send the least telemetry to Microsoft Read More ▶ |
|
eBook: Citrix Systems In order to give employees the work-fromanywhere-using-any-device flexibility they've come to expect, enterprise IT has been left with no alternative but to purchase point products for each of the applications and/or device profiles resulting in complexity in the datacenter. Read More ▶ |
When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success. ▶ |
Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that. ▶ |
This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here. ▶ |