1. Articles in category: Security

    1-24 of 379 1 2 3 4 ... 14 15 16 »
    1. DDoS a top security and business issue, study shows

      DDoS a top security and business issue, study shows

      Dealing with data under GDPR CIO interview: Jim Downing, Metail How CIOs can apply IT supplier management skills to digitisation Distributed denial of service (DDoS) attacks are often used in conjunction with other forms of cyber attack, but on their own can have a devastating impact on business, a study shows.

      Read Full Article
      Mentions: Security
    2. SDN solves a lot of network problems, but security isn't one of them

      SDN solves a lot of network problems, but security isn't one of them

      As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.

      Software defined networking (SDN) holds lots of promises. By consolidating the control planes of multiple devices into a single controller, that controller becomes the omnipotent decision maker over the entire network.

      Read Full Article
      Mentions: SDN Security
    3. IDG Contributor Network: 7 best practices for securing your cloud service

      IDG Contributor Network: 7 best practices for securing your cloud service

      As enterprises move their applications and data to the cloud, executives increasingly face the task of balancing the benefits of productivity gains against significant concerns about compliance and security.

      Security in the cloud is not the same as security in the corporate data center. Different rules and thinking apply when securing an infrastructure over which one has no real physical control.

      Read Full Article
    4. Robots are just as plagued by security vulnerabilities as IoT devices

      Robots are just as plagued by security vulnerabilities as IoT devices

      An analysis of robots used in homes, businesses and industrial installations has revealed many of the same basic weaknesses that are common in IoT devices, raising questions about security implications for human safety. The robotics industry has already seen significant growth in recent years and will only further accelerate.

      Read Full Article
      Mentions: Security
    5. The 7 security threats to technology that scare experts the most

      The 7 security threats to technology that scare experts the most

      What happens if a bad actor turns off your heat in the middle of winter, then demands $1,000 to turn it back on? Or even holds a small city’s power for ransom? Those kinds of attacks to personal, corporate, and infrastructure technology were among the top concerns for security experts from the SANS Institute, who spoke Wednesday during the RSA conference in San Francisco.

      Read Full Article
      Mentions: Security
    6. 6 Reasons Mobile Security is Critical for Enterprises

      6 Reasons Mobile Security is Critical for Enterprises

      6 Reasons Mobile Security is Critical for Enterprises 6 Reasons Mobile Security is Critical for Enterprises Admin. Mobile Devices Bring Your Own Device, or BYOD , is a relatively new business approach to technology. The days of issuing employees company-owned laptop computers, cell phones and pagers are largely over.

      Read Full Article
      Mentions: BYOD Security
    7. IoT security guidance emerges

      IoT security guidance emerges

      More than a year ago, an eye-opening RAND study on cybersecurity comprehensively explored just how vulnerable the Internet of Things (IoT) is and was going to be.

      Afterthought-style patch-on-patch security, as well as significant vulnerability risks involved with slapping internet connectivity on previously non-connected objects, were among the startling findings and predictions in that report.

      Read Full Article
      Mentions: Security
    8. How companies can deal with insider data theft

      How companies can deal with insider data theft

      To learn that your company's confidential data was stolen -- not by any hacker, but by an employee -- is a nightmare scenario that no one wants to face.

      But it's also a risk that's very real. The recent arrest of a former NSA contractor suspected of stealing classified government files is just the latest high-profile example, and security experts say all companies need to be on guard against potential insider threats.

      Read Full Article
      Mentions: Security
    9. Here are 6 super security tips to help protect iPhone 7 users

      Here are 6 super security tips to help protect iPhone 7 users

      The launch of the iPhone 7 was Apple enthusiasts’ stand-out moment of 2016, with another swathe of new fans entering the iOS fold. But how can users truly be secure? In early September, Apple revealed what we called the “biggest overhaul to the iPhone line-up in three years”, with the iPhone 7 and iPhone 7 Plus bringing the line’s processing power and camera capabilities to a new level.

      Read Full Article
    10. Circle: Parental controls through a Disney-branded router add-on

      Circle: Parental controls through a Disney-branded router add-on

      As a parent of three children who have been exposed to technology since they were born (we called our second child “iBaby 2.0”), the issue of filtering and parental controls has been on my mind for several years. I’m not particularly advocating that every parent filter content or use “nanny software” to become a babysitter for Internet content. On the other hand, I’ve seen a LOT of examples where kids have been exposed to things on the Internet that they probably shouldn’t be exposed to.

      Read Full Article
    11. The race to secure the smart connected future

      The race to secure the smart connected future

      Of the many challenges which stand in the way of digital transformation today, one of the most pressing is security, and failure to address cybersecurity could result in a slowdown in the adoption of smart, digital practices, according to Wael Mohamed, President and COO of Trend Micro. The security threat landscape is changing, Mohamed noted, both in terms of the range and number of systems that are potentially at risk, and the severity of the threats.

      Read Full Article
      Mentions: Security
    12. Emerging technologies are poking holes in security

      Emerging technologies are poking holes in security

      Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the kinds of change challenge change management and ultimately security.

      To secure the enterprise in environments of unwieldy change, the business needs to know how each new technology affects change management and the organization’s security defenses.

      Read Full Article
      Mentions: BYOD Security
    13. IT Security Experts Expecting Cyber Attacks

      IT Security Experts Expecting Cyber Attacks

      Okta’s recently-released "Security Business Agility" report shows that around two-thirds of the surveyed companies expect a data breach within the year, unless their legacy security solutions get upgraded. While hackers and cyber criminals are always upgrading and finding new ways to overcome security solutions, companies that fall behind in their own security become easier and easier targets.

      Read Full Article
      Mentions: BYOD Security
    14. Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

      Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

      Last year, private sector companies globally spent more than $75 billion on security software to safeguard their systems and data.

      That number is expected to grow about 7% annually, according to Gartner and other analyst firms. It doesn’t include all the massive amounts spent on fraud prevention by banks, a number that is widely underreported and expected to reach into the billions annually.

       

      Read Full Article
    1-24 of 379 1 2 3 4 ... 14 15 16 »
  1. Unified Access from Alcatel-Lucent Enterprise = seamless user experience
  2. Categories

    1. Industries:

      Education, Government, Healthcare, Hospitality, Manufacturing, Small Business, Transportation
    2. Technology Trends:

      Agile IT, Automation, Big Data, Business Intelligence & Analytics, Business Transformation, BYOD, Consumerization of IT, Digital Business, Digital Collaboration, Digital Transformation, Everything as a Service, Industry Reports, Internet of Things, IP Video, IT & Technology as a Service, IT Simplification, Mobility, Personal Cloud, Shift to Consumption Models, Tech Terms & Acronyms, Technology Evolution, The role of SIP, User Experience, WebRTC
    3. Business Strategies:

      Business Process, Business Strategy, Customer Service, Financial Models, IT as a Service, IT Management, IT Service & Support, Knowledge Management, Marketing & Sales
    4. ALE Technology Strategies:

      Application Fluent Network, Cloud, Convergence, Networking as a service, SDN, Security, Unified Access, Virtualization
    5. Technologies:

      DECT, Ethernet, Intelligent Fabric, IPv6, Link Aggregation, Network Access Control, Power over Ethernet, Smart Analytics, SPB, uNP, Virtual Chassis, Virtual Machine, Virtual Network Profiles, Voice over IP, Wireless LAN
    6. Solutions:

      Business Telephony, Cloud Communication, Customer Service, Data Center, Hardened Ethernet, Mobile Campus, Mobility, Network on Demand, Small & Medium Business, Unified Communications
  3. Popular Articles

  4. Organizations in the News

    1. (1 articles) Security