![]()
Attract, Retain and Delight More Customers
Close more deals in less time, track your sales activities and access customer data from your mobile device.
Grow your business with Zoho CRM.
Sign up now for a free 15-day trial.
|
A New Day for ID Management July 23, 2012
Let's examine the relationship between controlled digital identities in cyber risk management. Our panel will explore how the technical and legal support of ID management best practices have been advancing rapidly. And we'll see how individuals and organizations can better protect themselves through better understanding and managing of their online identities.
|
Securing Federal Employees' Mobile Devices: Big Opportunities, Big Challenges July 20, 2012
The burgeoning market for mobile devices such as smartphones and tablets is not only affecting consumer use of information technology, but also having an impact on the private sector workplace. The mobile IT market is clearly hot. Worldwide shipments of major brand smartphones increased by 50 percent to 152.3 million units in the first quarter of 2012 versus the same period last year, according to IDC.
|
|
The Cloud: Aggressive Adoption, Accretive Benefits July 16, 2012
Many organizations have gleaned huge benefits from high degrees of virtualization and aggressive cloud computing adoption. Revlon and SAP are two companies that recently participated in a VMware-organized media roundtable event in San Francisco. The event, attended by industry analysts and journalists, demonstrated how mission-critical applications are transforming businesses.
|
The BYOD Maelstrom: Legal, Technical Issues Abound June 13, 2012
When companies started issuing BlackBerry phones, the world changed. With the advent of the iPhone and Android, the world changed again. Employees started using the newer, hotter technologies, and many carried the company BlackBerry and the iPhone or an Android handset but did not like carrying one device for work and one for personal stuff.
|
|
5 Tips for Braving the BYOD Boom June 08, 2012
On today's information technology landscape, one thing is glaringly obvious: Security concerns associated with employees bringing personal devices onto the corporate network -- both internal and external -- are keeping IT managers up at night. The "consumerization" of IT is having an enormous impact on IT security.
|
Keeping Your Head Above Churning IT Waters May 29, 2012
The upcoming HP Discover 2012 conference in Las Vegas is both an exclamation point on the current enterprise IT climate of change as well as a neon signpost for HP's strategy and direction. Why is IT is at a crossroads? How is the very nature of IT being redefined as a result of large and global trends?
|
|
Symantec on the Move With Enterprise Security May 09, 2012
Antivirus vendor Symantec has announced enhancements to its enterprise mobile security product. These include capabilities for mobile application management, data loss prevention, certificate management and code signing for devs. The features will help IT cope with the burgeoning Bring Your Own Device trend, which has employees increasingly using their personal mobile devices for work, Symantec said.
|
Anonymous Strikes Most Fear in the Hearts of IT Security Managers April 24, 2012
The hacker group Anonymous and other so-called hacktivists are the biggest concern for IT security professionals, according to a survey by Bit9. Its 2012 Cyber Security Survey queried nearly 2,000 IT security experts to gauge the current state of enterprise security and otherwise identify what keeps IT executives up at night.
|
|
Hacktivists, Not Profiteers, Stole Most Data in 2011 March 22, 2012
Cyberattacks carried out by hacktivists -- hackers motivated by political reasons -- shot up in 2011, accounting for 58 percent of the data stolen in cyberbreaches, according to Verizon. The company's 2012 Data Breach Investigations Report also stated that 79 percent of the attacks were opportunistic, meaning they were carried out because an opportunity presented itself, rather than being planned.
|
It's Business as Usual for Anonymous as Panda Takes a Hit March 07, 2012
The hacktivists known as "Anonymous" have retaliated following Tuesday's news of the arrests of LulzSec hackers exposed by their former leader, Hector Xavier Monsegur. Overnight, Anonymous hackers took down more than 25 websites belonging to Panda Security. They also posted email addresses, usernames and passwords of more than a hundred of the firm's employees and defaced a number of marketing-related sites.
|
|
The Over/Under on Cloud Security February 21, 2012
For some, any move to the cloud -- at least the public cloud -- means a higher risk for security. For others, relying more on a public cloud provider means better security. There's more of a concentrated and comprehensive focus on security best practices that are perhaps better implemented and monitored centrally in the major public clouds. And so which is it?
|
Identity and Access Management: A New, Less Excruciating Approach January 10, 2012
As essential as open systems and mobile applications are for doing business, they also put significant strain on an organization's security systems and, in particular, the key line of defense: identity and access management systems.
|
|
Enterprise Security System Puts Android Under Lock and Key October 12, 2011
The proliferation of smartphones has created headaches for security-minded IT departments everywhere, but a Motorola subsidiary aims to give system administrators more peace of mind with a solution for managing Android phones in business environments. Three Laws Mobility, purchased by Motorola eight months ago, announced Tuesday that its management solution for Android phones is now ready for prime time.
|
Enterprise Security: New Weapons for a New War February 28, 2011
Looking back over the past few years, it seems like cybersecurity and warfare threats are only getting worse. We've had the Stuxnet Worm, the WikiLeaks affair, China-originating attacks against Google and others, and the recent Egypt Internet blackout. But are cybersecurity dangers, in fact, getting that much worse?
|
|
Who's Keeping Tabs on Tablet Security? January 07, 2011
Forget the notebook, the netbook or the laptop; this is going to be the year of the tablet. Corporations from Salesforce.com to Mercedes-Benz and JPMorgan Chase have started equipping their executives with iPads. Meanwhile, a slew of new Android and Windows tablets have been taking the spotlight at CES this week. At the same time, security vendors have warned that mobile malware is on the rise.
|
The Architect and the CSO: Enterprise Security's Dynamic Duo July 24, 2010
Welcome to a panel discussion that examines the need for improved common defenses -- including advancing cooperation between enterprise architects and chief security officers -- to jointly defend against burgeoning cyber security threats. The risks are coming from inside enterprises, as well as myriad external sources.
|
|
Pinning Down Enterprise Data Security in the Cloud May 18, 2009
As a growing number of enterprises transition to cloud computing, the use of the term "cloud" becomes more appropriate by the day. Just as natural clouds foreshadow weather events ranging from calm to stormy, cloud computing presents enterprise security professionals with a host of difficult challenges.
|
See More Articles in Enterprise Security Section >>

Headline Feeds

















