After a flawed AV update issued by McAfee left thousands of the security company's customers scrambling to get their systems re-configured and back running normally, scammers have predictably moved...
As cybercriminals continue to advance their attempts to cash-in on end users' sensitivity to potential security risks they're increasingly combining time-honored social engineering schemes with phony desktop alerts and...
Despite growing awareness that most of today's unsolicited e-mail constitutes some form of attack, many people continue to open and interact with the spam they receive and expose themselves...
Based on the results of a survey conducted at last week's RSA Security Conference in San Francisco, IT security pros are more concerned than ever regarding the resiliency of...
Experts speaking at the RSA Security Conference 2010 in San Francisco cited many of the same issues that have long thwarted U.S. cyber-security reform as the most significant problems...
Lenovo’s Infrastructure Solutions Group (ISG) recently issued announcements that illustrate the value offered by its strategic partners. Let’s consider them in more detail.
Also see: Digital...
The world is more connected than ever thanks to the proliferation of Internet of Things (IoT), connected edge computing devices and the technology that...
Business process management is the coordination of staff and computing systems to produce advantageous business outcomes.
Along with traditional processes for accounting and finance, there...