Google targeted about the vast amount of personal data it collects on a daily basis from users.
- By Ginger Hill
- Jul 11, 2013
As the world moves more and more toward digital, securing data is essential.
- By Ginger Hill
- Jun 25, 2013
As the security industry continues to grow, dealers and integrators must focus on trends within the industry in order to position themselves for growth.
- By Ginger Hill
- Jun 17, 2013
Features critical security advancements, including the ability to accurately identify the origin of Web application traffic to proactively distinguish between legitimate and malicious sources.
Cybercriminals are taking a toll on small businesses. Revealed here are some of cybercriminals' most popular tactics and how small businesses can counter-act them.
- By Ginger Hill
- May 23, 2013
Known simply as SWAC, this Secure Worker Access Consortium, driven by RTTG's Real-Time Verification (RTV) technology platform, is a comprehensive, highly-secure, information-sharing program that helps to ensure that workers who access critical facilities or key infrastructures are known, safe and threat-free.
Tyfone combines local- and cloud-based technologies for trusted verification of passwords, biometrics and other digital ID credentials to counter security breaches.
HID Global’s focus areas of use for new applications include authentication of items, secure data management and trusted authorizations.
Meanwhile, 46% admitted to bypassing security to get their job done, and 40% admitted that if they were breached no one would notice.
Provides extremely cost-effective means to utilize analog infrastructure for networked systems.
According to Mark Bower, even in a highly-controlled organization the size of the US Army, there are going to be operations where staff, for various reasons, ignore their corporate security mandates.
To select this year's Laureates, Computerworld relied on a panel of 22 distinguished judges -- many of them Computerworld Premier 100 IT Leader Honorees from diverse industries -- to evaluate the humanitarian benefits and measurable results of applying technology to meet a specific social or business need.
With over 500,000 apps in the Apple App Store, what security professional has time to wade through that list? I have compiled a list of the top 10 security-related, must-have apps.
- By Ginger Hill
- Apr 04, 2013
Acquisition further boosts Fortinet’s presence in enterprise by expanding its offerings in the ADC (Application Delivery Controller) market.
Bitzer has introduced Bitzer m/Drive, an enterprise-grade, mobile app that enables secure, direct access to corporate Intranet files from mobile devices.
Don't become the next Internet victim! From lurking spyware to sophisticated hackers, you need to build a line of defense to help ensure safe Internet browsing. Consider the following tips to establish your safe browsing plan with Internet Explorer.
- By Ginger Hill
- Mar 20, 2013
Burger King's catch phrase says, "have it your way," and it seems that's just what hackers did to the company's official Twitter account.
- By Ginger Hill
- Mar 11, 2013
The fast-growing company for the security, datacom, telecom and electrical wiring markets has strengthened its distribution support.
PoE is redefining how security professionals design and deploy systems. Rather than using the standard type of power supplies, integrators are increasingly employing PoE network switches or incorporating PoE midspan devices that inject power into an Ethernet cable after it leaves the switch and before it reaches the network device.
- By Ronnie Pennington
- Mar 01, 2013
Use this advice to develop habits to create a personal smartphone security plan that is right for you.
- By Ginger Hill
- Feb 27, 2013