Security Management 360˚

BIBABIog2014-630x297
splunk
mcaffe
imation
watchful
Ricardo Slide

Security Management 360˚ Hot Topics

Google Apps and Your Data: F...

While there are dozens of really good reasons to use Google Apps for your business (most of the...

»  read more

Backupify gives insight on c...

Choosing a cloud application backup provider is like any technology decision: there is no one-s...

»  read more
picture

IDC IT Security Conference 2...

The theme of this year’s IDC IT Security Conference 2014 is “Security as a Business: Risk M...

»  read more

Forescout aim to tackle infr...

This IDG Connect survey, sponsored by ForeScout, illustrates the nature and extent of the secur...

»  read more

Google boosts Chrome encryption amid email warning

Google routinely publishes reports to establish transparency into how often responds to data requests from law enforcement agencies, but its latest update pertains more to industry competitors. The Internet giant issued a memo on Tuesday -- a reminder to some and... »  read more

Companies Still Not Taking Cyber Security Seriously, Survey Finds

With high-profile security breach disclosures becoming an almost every-day occurrence, you'd think that most businesses would be taking cyber security seriously by now. Sadly, that's just not the case, a new study has revealed. In reality, incidents of cybercrime and their... »  read more

Facebook Conceal will protect data on your smartphone’s SD card

When your smartphone caches part of your mobile apps and data onto your SD card, that data's vulnerable: It can be seen by other apps. Facebook's Conceal, a set of Java APIs, will solve the problem for those developers that... »  read more

5 signs of network disruption

When the Federal Information Security Management Act was passed in 2002, federal agencies received a wake-up call to tighten the reins on information security. Driven by FISMA’s compliance framework that set forth unwavering standards for federal data security, agencies began... »  read more

Senior Management: the weakest link in your security?

As companies look for solutions to protect the integrity of their networks, data centers, and computer systems, an unexpected threat is lurking under the surface—senior management.   According to a new survey, 87% of senior managers frequently or occasionally send work materials... »  read more

» view more
 
 

Google Apps and Your Data: Five Potential Threats That Google Can’t Defend Against, But You Can

While there are dozens of really good reasons to use Google Apps for your business… » read more

Backupify gives insight on cloud backup technology

Choosing a cloud application backup provider is like any technology decision: there is no one-size-fits-all… » read more

» view more