Articles

Tag: security (page 9)

  • Menlo Security Claims It Can Isolate Your Malware

    Menlo Security Claims It Can Isolate Your Malware

    Isolation has always been seen as the ultimate defense against a malware attack— whether it's the simple act of turning off your Internet connection to keep malware from sending out purloined data to more sophisticated virtualization use cases.

    Continue reading...


  • You Can Bring Down a Website for $38

    You Can Bring Down a Website for $38

    Could you pass up a $40,000 return on a $20 investment? Odds are you couldn't if you enjoy wreaking havoc on a business. New research released today by Incapsula shows distributed denial of service (DDoS) assaults continue to be expensive nuisances for online businesses — and that the attacks can

    Continue reading...


  • 1 in 3 Enterprises Leak Data

    1 in 3 Enterprises Leak Data

    More than a third of companies have suffered data leaks because of public file sync and share (FSS) applications — and three out of four enterprises are now looking to replace those applications. That's the dismal news CTERA Networks revealed yesterday in its 2015 Enterprise Cloud Storage Report, the

    Continue reading...


  • Choosing the Best Public Cloud Provider

    Choosing the Best Public Cloud Provider

    Here's your challenge: Pick the best public cloud provider from the leaders of the pack. Your options: Amazon (AWS), Azure, Google (GCP), IBM Cloud and Rackspace. Confused? You're not alone.

    Continue reading...


  • 10 Ways to Secure Office 365

    10 Ways to Secure Office 365

    Security. If there's one thing that concerns organizations contemplating a move of their data to the cloud, or that are already there, it's security. With new threats being introduced on a regular basis, organizations need to use all the tools they have at their disposal to secure their data.

    Continue reading...


  • Are Careless Employees Threatening Your IT Security?

    Maybe we've been making a mistake all these years, plowing the majority of our IT security resources into new security approaches and technologies. More and more studies are showing that human error is behind a significant number of security breaches.

    Continue reading...


  • Is Citrix's Workspace Cloud All That Special?

    Is Citrix's Workspace Cloud All That Special?

    We’ve been talking about virtual workspaces for way too long, even before there were iPads. The idea of being able to easily reach your desktop from any endpoint has long been a promise, but never one that was widely accepted by end users or delivered to the masses by IT.

    Continue reading...


  • Why Do Large Enterprises Have Security Breaches?

    Why Do Large Enterprises Have Security Breaches?

    Large enterprises. Mid-sized businesses. Mom and pops.  Seems like they're all vulnerable to data security breaches today, right? It's no longer as easy as locking up the front door of the business. Just ask Slack, Target and even Salesforce, each of which dealt with cyber attacks on some

    Continue reading...


  • Is the Apple Watch a Security Threat?

    Is the Apple Watch a Security Threat?

    The Apple Watch. We know it's pretty and new and sexy and fun to use. We know it will be a great complement to other mobile devices.

    Continue reading...


  • Encrypt the Whole Web, Mozilla Pleads (Again)

    Encrypt the Whole Web, Mozilla Pleads (Again)

    If the whole web were encrypted by default, communications engineers argued, then malicious actors wouldn’t be able to guess which web sessions were relatively important by whether or not they were encrypted. The technology existed, the standards were in place and most of these engineers were supportive. It was 1999.

    Continue reading...


  • Metalogix Wants to Take a Bite Out of Data Loss

    Metalogix Wants to Take a Bite Out of Data Loss

    Metalogix announced today that it's putting its new personal information watchdog into technical preview. It's called Sensitive Content Manager (SCM) — and Metalogix promises it will help users raise hell with anyone who abuses your personal information.

    Continue reading...


  • Simple Lessons on E-Signatures [Infographic]

    Simple Lessons on E-Signatures [Infographic]

    In the past few months, we've heard a lot of speculation why e-signature software has been so slow to gain traction — from legal and security issues to worker resistance and misunderstandings about how to use them.

    Continue reading...


  • Demystifying Bimodal IT: 3 Questions Answered

    Demystifying Bimodal IT: 3 Questions Answered

    Managers today understand that keeping up with their agile workforces is the key to staying competitive, no matter what industry they're in. But these employees aren't necessarily making that an easy task.

    Continue reading...


  • Xerox Offers 10 New Ways to Manage Documents

    Xerox likes to do things in a big way. At least that's the message it sent today by launching ten apps to automate document related processes, and, in the process, push many of them into the mobile world.

    Continue reading...


Displaying 113-126 of 607

NL-01a
Get the CMSWire Newsletter
  • Receive concise summaries of what's happening in your industry
  • Get access to exclusive reports, white papers and webinars

lock We take your privacy seriously

NL-03a
Get the CMSWire Newsletter

You'll receive:

  • Exclusive Articles
  • Latest White Papers
  • Early Event Invites

Join 55,000 subscribers and growing

We take your privacy seriously

Get the CMSWire Newsletter

Join 55,000 subscribers and growing

We take your privacy seriously

You'll receive

  • Exclusive Articles
  • Latest White Papers
  • Webinar Invites
NL-03a
Join 55,000
of your peers

Get the CMSWire newsletter.
Access exclusive news, best practices and events.