Monthly Archives: May 2014
Daily Tech Briefing: May 8, 2014
Facebook started the Open Compute Project in 2011, which now has Intel, Advanced Micro Devices, Broadcom, Mellanox Technologies and Rackspace as members.While the months-old...
Skyrocketing Cloud App Use Raises Enterprise Security Risks
The number of cloud services used by corporate employees has dramatically increased in the past quarter, with most of the services not approved by...
Business Tablets Address Security, User Preferences
Business Tablets Address Security, User Preferences
by Michelle Maisto
Intel Focusing on Android
While Android is the leading smartphone OS, security concerns have made it a less...
OpenStack Congress Set to Define IT Policy
Setting up the policies that define compute, storage, and networking access and performance represents a key control point in any cloud or enterprise IT...
Online Leaders Tell FCC Chairman to Protect a Free, Open Internet
Google, Yahoo, Facebook, Ebay, Twitter and Microsoft are among 149 Internet-based companies that signed a May 7 letter to Federal Communications Commission (FCC) Chairman...
10 Reasons Today’s Malware Threats Require Defense in Depth
10 Reasons Today's Malware Threats Require Defense in Depth
by Don Reisinger
You Can't Keep Safe Just By Running an Antivirus Scanner
Symantec itself acknowledged that when...
Internet of Things Presents Host of Security Challenges
CAMBRIDGE, Mass.—Emil Sturniolo doesn't want to see the burgeoning Internet of things go the same way the Internet did almost 30 years ago, at...
Google Spruces Up Maps Apps for iOS and Android
Google Maps apps for Android and iOS are continuing to be tweaked and improved by Google, and the latest versions add new features such...
Multilevel Security Strategy Needed, but SMBs Face Tough Battle
First of all, don't run out and cancel your anti-malware subscriptions just because you heard that antivirus software is dead. It's not dead. Instead,...
Deceptive Downloads Often Bundle Malware, Ransomware
Cyber-criminals are increasingly using "deceptive tactics" to circumvent the protections that Microsoft has built into its software over the past couple of years, according...