1. Articles in category: Security

    1-24 of 386 1 2 3 4 ... 14 15 16 »
    1. Security for connected cars must be powerful

      Security for connected cars must be powerful

      I have never seen anyone pull into a parking space, get out of their car and leave their laptop, wallet, iPhone, social security card, list of most important passwords and their banking information on the hood before walking away. But as the era of the connected car begins, that may essentially start happening every day.

      Read Full Article
      Mentions: Security
    2. All That You Need to Know About The Internet of Things Security

      All That You Need to Know About The Internet of Things Security

      The Internet of Things (IoT) has undoubtedly been identified as the biggest surprise and gift of the digitalized world. It has rightly been described as a communication revolution in which the internet is connected with millions of computing devices, home appliances, digital machines, sensors and many more. It is an ultra-modern technology that does not require the support of human and computer interaction, but the data gets transmitted easily through unique identifiers.

      Read Full Article
      Mentions: Security
    3. DDoS a top security and business issue, study shows

      DDoS a top security and business issue, study shows

      Dealing with data under GDPR CIO interview: Jim Downing, Metail How CIOs can apply IT supplier management skills to digitisation Distributed denial of service (DDoS) attacks are often used in conjunction with other forms of cyber attack, but on their own can have a devastating impact on business, a study shows.

      Read Full Article
      Mentions: Security
    4. SDN solves a lot of network problems, but security isn't one of them

      SDN solves a lot of network problems, but security isn't one of them

      As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.

      Software defined networking (SDN) holds lots of promises. By consolidating the control planes of multiple devices into a single controller, that controller becomes the omnipotent decision maker over the entire network.

      Read Full Article
      Mentions: SDN Security
    5. IDG Contributor Network: 7 best practices for securing your cloud service

      IDG Contributor Network: 7 best practices for securing your cloud service

      As enterprises move their applications and data to the cloud, executives increasingly face the task of balancing the benefits of productivity gains against significant concerns about compliance and security.

      Security in the cloud is not the same as security in the corporate data center. Different rules and thinking apply when securing an infrastructure over which one has no real physical control.

      Read Full Article
    6. Robots are just as plagued by security vulnerabilities as IoT devices

      Robots are just as plagued by security vulnerabilities as IoT devices

      An analysis of robots used in homes, businesses and industrial installations has revealed many of the same basic weaknesses that are common in IoT devices, raising questions about security implications for human safety. The robotics industry has already seen significant growth in recent years and will only further accelerate.

      Read Full Article
      Mentions: Security
    7. The 7 security threats to technology that scare experts the most

      The 7 security threats to technology that scare experts the most

      What happens if a bad actor turns off your heat in the middle of winter, then demands $1,000 to turn it back on? Or even holds a small city’s power for ransom? Those kinds of attacks to personal, corporate, and infrastructure technology were among the top concerns for security experts from the SANS Institute, who spoke Wednesday during the RSA conference in San Francisco.

      Read Full Article
      Mentions: Security
    8. 6 Reasons Mobile Security is Critical for Enterprises

      6 Reasons Mobile Security is Critical for Enterprises

      6 Reasons Mobile Security is Critical for Enterprises 6 Reasons Mobile Security is Critical for Enterprises Admin. Mobile Devices Bring Your Own Device, or BYOD , is a relatively new business approach to technology. The days of issuing employees company-owned laptop computers, cell phones and pagers are largely over.

      Read Full Article
      Mentions: BYOD Security
    9. IoT security guidance emerges

      IoT security guidance emerges

      More than a year ago, an eye-opening RAND study on cybersecurity comprehensively explored just how vulnerable the Internet of Things (IoT) is and was going to be.

      Afterthought-style patch-on-patch security, as well as significant vulnerability risks involved with slapping internet connectivity on previously non-connected objects, were among the startling findings and predictions in that report.

      Read Full Article
      Mentions: Security
    10. How companies can deal with insider data theft

      How companies can deal with insider data theft

      To learn that your company's confidential data was stolen -- not by any hacker, but by an employee -- is a nightmare scenario that no one wants to face.

      But it's also a risk that's very real. The recent arrestĀ of a former NSA contractor suspected of stealing classified government files is just the latest high-profile example, and security experts say all companies need to be on guard against potential insider threats.

      Read Full Article
      Mentions: Security
    11. Here are 6 super security tips to help protect iPhone 7 users

      Here are 6 super security tips to help protect iPhone 7 users

      The launch of the iPhone 7 was Apple enthusiasts’ stand-out moment of 2016, with another swathe of new fans entering the iOS fold. But how can users truly be secure? In early September, Apple revealed what we called the “biggest overhaul to the iPhone line-up in three years”, with the iPhone 7 and iPhone 7 Plus bringing the line’s processing power and camera capabilities to a new level.

      Read Full Article
    12. Circle: Parental controls through a Disney-branded router add-on

      Circle: Parental controls through a Disney-branded router add-on

      As a parent of three children who have been exposed to technology since they were born (we called our second child “iBaby 2.0”), the issue of filtering and parental controls has been on my mind for several years. I’m not particularly advocating that every parent filter content or use “nanny software” to become a babysitter for Internet content. On the other hand, I’ve seen a LOT of examples where kids have been exposed to things on the Internet that they probably shouldn’t be exposed to.

      Read Full Article
    13. The race to secure the smart connected future

      The race to secure the smart connected future

      Of the many challenges which stand in the way of digital transformation today, one of the most pressing is security, and failure to address cybersecurity could result in a slowdown in the adoption of smart, digital practices, according to Wael Mohamed, President and COO of Trend Micro. The security threat landscape is changing, Mohamed noted, both in terms of the range and number of systems that are potentially at risk, and the severity of the threats.

      Read Full Article
      Mentions: Security
    1-24 of 386 1 2 3 4 ... 14 15 16 »
  1. Unified Access from Alcatel-Lucent Enterprise = seamless user experience
  2. Categories

    1. Industries:

      Education, Government, Healthcare, Hospitality, Manufacturing, Small Business, Transportation
    2. Technology Trends:

      Agile IT, Automation, Big Data, Business Intelligence & Analytics, Business Transformation, BYOD, Consumerization of IT, Digital Business, Digital Collaboration, Digital Transformation, Everything as a Service, Industry Reports, Internet of Things, IP Video, IT & Technology as a Service, IT Simplification, Mobility, Personal Cloud, Shift to Consumption Models, Tech Terms & Acronyms, Technology Evolution, The role of SIP, User Experience, WebRTC
    3. Business Strategies:

      Business Process, Business Strategy, Customer Service, Financial Models, IT as a Service, IT Management, IT Service & Support, Knowledge Management, Marketing & Sales
    4. ALE Technology Strategies:

      Application Fluent Network, Cloud, Convergence, Networking as a service, SDN, Security, Unified Access, Virtualization
    5. Technologies:

      DECT, Ethernet, Intelligent Fabric, IPv6, Link Aggregation, Network Access Control, Power over Ethernet, Smart Analytics, SPB, uNP, Virtual Chassis, Virtual Machine, Virtual Network Profiles, Voice over IP, Wireless LAN
    6. Solutions:

      Business Telephony, Cloud Communication, Customer Service, Data Center, Hardened Ethernet, Mobile Campus, Mobility, Network on Demand, Small & Medium Business, Unified Communications
  3. Popular Articles