Today’s mobile phones have become more than just a way to make and receive calls, and, as such, their appeal to cyber criminals has increased. Mobile malware is now very much a reality and a growing threat. The truth is, malware can end up on a mobile device and it can be difficult for end users to know if they’ve been infected. This slideshow features tips, identified by Jaime Blasco, head of AlientVault Labs, on how you can protect your smartphones from possible attacks.
Compliance Outlook: SIEM and Database Security Are Top Priorities Annual report reveals organizations are moving away from "one-size-fits-all" approach and are looking for best-of-breed core solutions for risk and compliance.
Top Five IT Operations Management Software Vendors Worldwide IT operations management (ITOM) software revenue totaled $18.3 billion in 2011, an increase of 8.7 percent from 2010.
The Internet Forecast to Quadruple in Size in Next Four Years Annual Cisco VNI forecast expects worldwide devices and connections to grow to almost 19 billion by 2016.
Today's CIO has a lot to do to make BYOD work, starting with a well-designed policy covering employee privacy rights and a company's right to monitor, access, review and disclose company data. ... More >>
The infusion of personal devices, apps and networks into the corporate environment presents a significant security challenge, and is complicated by the presence of assets not fully under the IT department's control. ... More >>
CES recently announced the honorees for its 2016 Best of Innovation award, a yearly competition that seeks out the best designs and engineering advancements in technology products. ... More >>