Beiträge aus der Kategorie: IT policy

Endpoint Management · IT policy · Mobile

Back to BlackBerry: Frustrated Mobile Users Reject BYOD for the Former Market Leader

It's a tough time to be a BlackBerry user.  Despite having a committed fan in the Oval Office and some new features to brag about, including a digital assistant, BlackBerry has seen Android, Apple...

Endpoint Management · IT policy

Broward College Deploys a Network Security Strategy Fit for the Best and Brightest

In the 1930s, when Louis A. Simon designed the famous U.S. Bullion Depository at Fort Knox, he could only have hoped that the building would be so secure, so impenetrable, that generations of...

Industry Commentary · IT policy

Government Network Security Failures Led to Remote Access Breaches

As technology advances, the number of cyber-attacks on both public and private networks also increases. According to the Washington Post, in 2013 alone, more than 3,000 enterprises were notified of...

Encryption · IT policy

IoT: Get Security Right The First Time

Let's start building security into the Internet of Things now, before everything becomes connected -- and hackable.

Endpoint Management · IT policy · VPN

Why a User-Centric Approach is Required for Network Security

Is your enterprise one of the many that are "subject to the whims of fickle consumer-business users" when it comes to adopting new technology?

Endpoint Management · IT policy · Mobile

Will Network Security Concerns Sink Government BYOD?

The Department of Homeland Security (DHS) issued a warning last week that the computer network of a public utility company had been compromised by a "sophisticated threat actor," likely through a...

Industry Commentary · IT policy · VPN

Are Your Employees Undermining Your Network Security?

Enterprises are constantly fighting to stay one step ahead of hackers, from upgrading endpoints using the now vulnerable Windows XP to Windows 8 or implementing more secure remote access technologies...

Industry Commentary · IT policy

NIST’s New Cryptography Guidance: What It Means for Enterprises

We recently weighed in on the significance of the Heartbleed bug, which was arguably the biggest rift in the cybersecurity space since Edward Snowden’s NSA revelations. While the OpenSSL vulnerability...

Industry Commentary · IT policy · VPN

Remote Workers Demand VPNs

With more companies going global, and more employees spread across multiple geographic locations, the demand for remote access technologies has never been greater. The good news is that telecommuting...

End of XP
Industry Commentary · IT policy · Rethink Remote Access · VPN · Windows 8

Long Live Windows XP…. And Mobile Security

At one point or another, we’ve all been blindsided by news that has literally changed our lives. Though we’re often left momentarily stunned, it’s imperative to figure out how to adjust and carry on....

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK