Search

Filter:

Search Results

HyTrust and VMware: A successful SDDC must be policy-based

of data accessibility: "whether it can be copied or not, what systems can actually access ...

Avaya's extended pact with HP will lead to UC-as-a-service-in-a-box

experience management, and video services to the list. This way, when HP sells them "the box," ...

Microsoft's Active Directory is missing link in Target breach saga

breach: From Russia, with malware Massive breach at Target compromises card data of 40 million shoppers ...

Two-thirds of IT pros subject to weekly phishing attacks

threats, enterprises are spending on average $2.6 million per year on network security, and more than 60 ...

News Scan: Overcoming bottlenecks to business intelligence; BYOD practices are flourishing, policies are not; More

The report also noted that the market now contains over one million apps. (Read more on tablet and game ...

300 Norwegian energy firms targeted in major cyber attack

live in a society of much data," according to The Local. Three years ago, at least 10 oil, gas ...

News Scan: New hires need mobility briefing; Judge rejects Apple's bid to ban Samsung phones; more

pick the wrong person | Reining in BYOD expenses] >> Judge rejects Apple's effort to bar ...

Bigger iPad may open door for Apple enterprise growth

Apple's anticipated 12.9-inch iPad could be exactly what the tech company needs to drive much needed growth in the enterprise, according to an article at ZDNet. Bloomberg broke the story early Wednesday morning that Apple plans to launch a larger-screened iPad at the beginning of next year. Tech ...

What is Backoff and how can you protect your organization from this malware?

the Target breach saw its POS compromised and put more than 100 million customers at risk for identity theft ...

Tips for addressing cybersecurity with the board

effectiveness." Tell a story and teach a lesson. "Use this time to train your board members and fellow ...