Provides extremely cost-effective means to utilize analog infrastructure for networked systems.
According to Mark Bower, even in a highly-controlled organization the size of the US Army, there are going to be operations where staff, for various reasons, ignore their corporate security mandates.
To select this year's Laureates, Computerworld relied on a panel of 22 distinguished judges -- many of them Computerworld Premier 100 IT Leader Honorees from diverse industries -- to evaluate the humanitarian benefits and measurable results of applying technology to meet a specific social or business need.
With over 500,000 apps in the Apple App Store, what security professional has time to wade through that list? I have compiled a list of the top 10 security-related, must-have apps.
- By Ginger Hill
- Apr 04, 2013
Acquisition further boosts Fortinet’s presence in enterprise by expanding its offerings in the ADC (Application Delivery Controller) market.
Bitzer has introduced Bitzer m/Drive, an enterprise-grade, mobile app that enables secure, direct access to corporate Intranet files from mobile devices.
Don't become the next Internet victim! From lurking spyware to sophisticated hackers, you need to build a line of defense to help ensure safe Internet browsing. Consider the following tips to establish your safe browsing plan with Internet Explorer.
- By Ginger Hill
- Mar 20, 2013
Burger King's catch phrase says, "have it your way," and it seems that's just what hackers did to the company's official Twitter account.
- By Ginger Hill
- Mar 11, 2013
The fast-growing company for the security, datacom, telecom and electrical wiring markets has strengthened its distribution support.
PoE is redefining how security professionals design and deploy systems. Rather than using the standard type of power supplies, integrators are increasingly employing PoE network switches or incorporating PoE midspan devices that inject power into an Ethernet cable after it leaves the switch and before it reaches the network device.
- By Ronnie Pennington
- Mar 01, 2013
Use this advice to develop habits to create a personal smartphone security plan that is right for you.
- By Ginger Hill
- Feb 27, 2013
According to the United States House Committee on Oversight & Government Reform, over 1.1 million tax returns were filed by identity thieves for the 2011 processing year.
FortiGuard Labs provide enhanced protection capability for their platforms while launching new, cloud-based sandboxing and IP reputation services to help stop advanced persistent threats (APTs).
McAfee released the results of its “Mobile Security: McAfee Consumer Trends Report,” documenting sophisticated and complex, risky apps containing multi-faceted scams, black market crimes, drive-by downloads and near-field communication threats. The report identifies a new wave of techniques hackers use to steal digital identities, commit financial fraud, and invade users’ privacy on mobile devices.
A large increase of online daters were found to be using mobile devices, according to iovation, a provider of online reputation protection.
Hurricane Sandy disrupted power, Internet, phone and various other technical services for millions of people and businesses along the East Coast in 2012. In the aftermath of the storm, organizations are reviewing the effectiveness—or lack thereof—of disaster recovery plans across all of their systems.
- By Lee Caswell, Greg Pellegrino
- Feb 01, 2013
Sandia National Laboratories in California have turned to smartphones and other hand-held computing devices to help prevent and mitigate disruptions to computer networks on the Internet as part of ongoing research.
UT Dallas computer scientists are trying to stay one step ahead of cyber attackers by creating their own monster. Their monster can cloak itself as it steals and reconfigures information in a computer program.
Recognizing that small business owners need a highly secure, affordable way to manage wireless devices, AT&T has expanded its cloud-based Mobile Device Management (MDM) offering with solutions for small businesses with a robust list of features previously available only to larger enterprise customers.
Platinum Tools, provider of solutions for the preparation, installation and hand termination of wire and cable, is proud to announce that the new Coax Clarifier™ (p/n TCC200 / 220) layout/fault finder is now shipping.