Posts Tagged ‘IT security’

By Bernd Reder As the workforce becomes increasingly mobile, the methods by which users access critical business tools must evolve in kind. In the past, the desktop environment and all of the resources it hosted were only accessible if an individual was sitting right in front of his or her computer. But now, with the [...]

Executive Q&A On Data Security

Posted: 19th February 2013 by VPN Haus in Expert Q&A, IT policy, Mobile
Tags: , , , ,

Today, Rainer Enders, VPN expert and CTO of Americas at NCP engineering, addresses how IT and data management executives can properly protect their corporate data. Q: What are the most effective steps IT and data management executives need to take in ensuring the best security for corporate information? Rainer Enders: There is no substitute for [...]

Dark Reading – Half Of Machines Shopping On Cyber Monday Likely Contain Vulnerabilities Midsize Insider  – IT Security Threats: The Predictive Problem  SearchCloudApplications – Mobile cloud trends: Apps let enterprises handle the risks of cloud computing TabTimes – Study: Forget corporate deployments, BYOD will drive business adoption of Windows 8 tablets Share this:EmailFacebookPrint

Dark Reading – Half Of Machines Shopping On Cyber Monday Likely Contain Vulnerabilities Midsize Insider  – IT Security Threats: The Predictive Problem  SearchCloudApplications – Mobile cloud trends: Apps let enterprises handle the risks of cloud computing TabTimes – Study: Forget corporate deployments, BYOD will drive business adoption of Windows 8 tablets Share this:EmailFacebookPrint

Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices CSO – Election sabotage: A threat much older than hacked e-voting InformationWeek – Malware Tools Get Smarter To Nab Financial Data SearchSecurity – Remote access Trojan evades detection using mouse functions Share this:EmailFacebookPrint