An Android Trojan is spreading across app stores, including Google Play, and has the capability of stealing sensitive files from corporate networks. Read More ▶ |
|
| Video/Webcast: IBM Corporation How are CIOs managing the new demand for self-service data with stringent requirements for data security? Hear insights from IDC analyst Dan Vesset in this short video. Read More ▶ | Stolen or weak remote desktop credentials are routinely used to infect point-of-sale systems with malware, but recently they've also become a common distribution method for crypto-ransomware. Read More ▶ |
| The Logitech K380 Multi-Device Bluetooth keyboard brings the comfort and convenience of desktop typing to your smartphone, tablet, and more Read More ▶ |
| Columnist Rob Enderle writes that the only thing that can stop a bad guy using analytics to spread celebrity-based malware is with a good guy using analytics to stop malware. Read More ▶ |
| | Its not enough to perform an IT audit to achieve compliance alone, Today's threat landscape includes sophisticated APT's, Advanced Persistent Threats, Remote access Trojans and Ransomeware to name a few, In order for an IT audit to have value it must consider the cyber kill chain and the IT controls ability to mitigate risk along each of the 6 stages. Read More ▶ |
| | White Paper: APC by Schneider Electric Digital remote monitoring services provide real-time monitoring and data analytics for data center physical infrastructure systems. These modern cloud-based platforms offer the promise of reduced downtime, reduced mean time to recovery (MTTR), less operations overhead, as well as improved energy efficiency for power and cooling systems. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|