Monthly Archives: February 2017
Phishing Site Study Reveals Why These Cyber-Scams Pervade the Web
Phishing Site Study Reveals Why These Cyber-Scams Pervade the Web
Phishing is a security problem for organizations worldwide, according to a report from security firm...
Bracket Computing Adds Forensic Capabilities to Isolation Platform
Bracket Computing announced new security features for its Computing Cell network isolation platform on Feb. 9. The new capabilities include runtime integrity protection and...
Microsoft Adds Instant Recovery Option to Azure Cloud Backup
Data at rest encryption on Azure File Storage isn't the only cloud storage-related update Microsoft has issued this week. On Feb. 8, the company...
Google Launches Mobile Live Streaming Support for YouTube
YouTube creators now have a new way to interact with the viewers of their videos.Google has launched a new mobile live streaming capability that...
Microsoft to Release Visual Studio 2017 on March 7
The wait is nearly over. Microsoft said today it plans to release Visual Studio 2017, the company's cross-platform IDE (integrated development environment), on Tuesday,...
Quest’s One Identity Now Manages Active Directory, Azure
Quest Software identity and access management arm One Identity has launched a new version of its platform that connects natively with Active Directory and...
What’s New in Google’s Long-Awaited Android Wear 2.0
What's New in Google's Long-Awaited Android Wear 2.0
Google has released Android Wear 2.0, the company’s latest wearable operating system Android Wear 2.0 was introduced...
Docker Secures Container Secrets in Datacenter Update
Docker is advancing its open-source container engine as well as its commercially supported Docker Datacenter platform with enhanced capabilities designed to help safeguard container...
Cisco Umbrella Secure Internet Gateway (SIG) Expanded
Among the many security challenges that organizations face is having an always-on security approach. It's a challenge that Cisco is aiming to solve with...
10 Ways Enterprises Can Limit Third-Party Cyber-Risk
10 Ways Enterprises Can Limit Third-Party Cyber-Risk
To compete in a global marketplace, enterprises increasingly are moving their business processes and other services to the...