Monthly Archives: February 2017

Cloud storage phishing attacks

Phishing Site Study Reveals Why These Cyber-Scams Pervade the Web

0
Phishing Site Study Reveals Why These Cyber-Scams Pervade the Web Phishing is a security problem for organizations worldwide, according to a report from security firm...
bracket computing

Bracket Computing Adds Forensic Capabilities to Isolation Platform

0
Bracket Computing announced new security features for its Computing Cell network isolation platform on Feb. 9. The new capabilities include runtime integrity protection and...
microsoft azure

Microsoft Adds Instant Recovery Option to Azure Cloud Backup

0
Data at rest encryption on Azure File Storage isn't the only cloud storage-related update Microsoft has issued this week. On Feb. 8, the company...
video streaming

Google Launches Mobile Live Streaming Support for YouTube

0
YouTube creators now have a new way to interact with the viewers of their videos.Google has launched a new mobile live streaming capability that...
visual studio

Microsoft to Release Visual Studio 2017 on March 7

0
The wait is nearly over. Microsoft said today it plans to release Visual Studio 2017, the company's cross-platform IDE (integrated development environment), on Tuesday,...
quest one identify solution

Quest’s One Identity Now Manages Active Directory, Azure

0
Quest Software identity and access management arm One Identity has launched a new version of its platform that connects natively with Active Directory and...
LG Watch

What’s New in Google’s Long-Awaited Android Wear 2.0

0
What's New in Google's Long-Awaited Android Wear 2.0 Google has released Android Wear 2.0, the company’s latest wearable operating system  Android Wear 2.0 was introduced...

Docker Secures Container Secrets in Datacenter Update

0
Docker is advancing its open-source container engine as well as its commercially supported Docker Datacenter platform with enhanced capabilities designed to help safeguard container...
Cisco logo

Cisco Umbrella Secure Internet Gateway (SIG) Expanded

0
Among the many security challenges that organizations face is having an always-on security approach. It's a challenge that Cisco is aiming to solve with...
Cyber-risk

10 Ways Enterprises Can Limit Third-Party Cyber-Risk

0
10 Ways Enterprises Can Limit Third-Party Cyber-Risk To compete in a global marketplace, enterprises increasingly are moving their business processes and other services to the...