What you can do to help prevent your social media login credentials from getting stolen.
- By Ginger Hill
- Dec 04, 2013
Integrated system offers improved response and management control.
Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.
- By Charles P. Williams
- Dec 01, 2013
To plug in or not to plug in? This is the question. Innovative Technology’s CEO, Corey Lieblein examines portable power solutions vs. the public charging kiosk.
- By Corey Lieblein
- Nov 04, 2013
The government recognizes the need to increase security for cyber and physical assets so counter measures to reduce, mitigate and eliminate external and internal terrorist threats have been, and remain, paramount.
- By Mark Steffler
- Nov 01, 2013
A world saturated with digital data needs assurance that this data won't fall into the wrong hands.
- By Ginger Hill
- Oct 17, 2013
Deep storage appliance delivers the most scalable and cost-effective, long-term storage.
"Forever Data 2013" details the vision of Spectra Logic's future and the data storage industry.
- By Ginger Hill
- Oct 07, 2013
With sensitive documents spread across tablets, laptops, smartphones and other devices, how do businesses keep this data safe?
Data from Google scanning can be used for more than just targeting advertising, though what Google might be doing with private information is currently under seal.
- By Antonia Gregory
- Sep 19, 2013
Fulcrum Biometrics created a customized patient identification solution for the New Tribes Mission Medical Clinic in Papua New Guinea using the Fulcrum Biometric Framework (FbF) Demographica application and the Lumidigm M-Series multispectral fingerprint reader to capture and identify fingerprints.
The key to data loss prevention is to always backup your data, but there are other ways to help prevent data loss in laptop computers.
- By John Riddell
- Sep 03, 2013
Organizations worldwide face a dangerous shortage of cyber warriors who possess the skills required to defend against cyber terrorism. A pragmatic and sustainable new approach is urgently needed to prepare cyber warriors to defend critical infrastructures.
How to manage and evaluate cost-effective solutions through the storage model for hosted video surveillance solutions.
It's time to recharge your iPhone battery, but before you plug in make sure it’s not a “Mactan!”
- By Ginger Hill
- Aug 01, 2013
The risk is still here and demands a data-centric approach to security.
New off-site tracking is Twitter’s way of relaying information to advertisers to create customized ads.
- By Ginger Hill
- Jul 24, 2013
American universities concerned as cyber attacks try to barge their way in.
- By Ginger Hill
- Jul 17, 2013
Google targeted about the vast amount of personal data it collects on a daily basis from users.
- By Ginger Hill
- Jul 11, 2013
As the world moves more and more toward digital, securing data is essential.
- By Ginger Hill
- Jun 25, 2013