Archive

Back to homepage
Industry Insights

Deep Web is a hub of criminality

Inside the hidden part of the internet exists a thriving den of criminal activity. Every day, millions of people access the Internet around the world for work or pleasure. What

Vendor News

Intralinks Signs Strategic Partnership Agreement to Provide Secure Content Collaboration Solutions in China

NEW YORK and HONG KONG, March 31, 2015 /PRNewswire/ — Intralinks® Holdings, Inc. (NYSE: IL), a leading global provider of secure enterprise content collaboration solutions, and Beijing Shenzhou Xiangyun Technology

BYOD/Big Data

Global BYOD Security Market is Expected to Reach $24.6 Billion by 2020 – Allied Market Research

PORTLAND, Oregon, March 30, 2015 /PRNewswire/ — According to a new report by Allied Market Research entitled, “Global BYOD Security Market- Size, Industry Analysis, Trends, Opportunities, Growth and Forecast, 2013-2020″,

Cloud

Research and Markets: UAE Cloud Security Market 2015-2019 with CA Technologies, IBM, McAfee & TrendMicro Dominating

The Cloud Security market in the UAE to grow at a CAGR of 35.16% over the period 2014-2019. Cloud security offers security to cloud-based services and cloud computing architectures. Cloud

Hardware/Network

The anatomy and physiology of APT attacks

The cyberthreat landscape has changed. We used to deal with hackers in the classic sense, from explorers of systems to script kiddies who used newly automated exploit tools, developed by

Software

Protecting Your Website With Always On SSL

This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of

Identity Theft

5 Breach Lawsuits Filed Against Premera

Meanwhile, Health Insurer Provides Answers to Congress Premera Blue Cross already is facing five class action lawsuits in the wake of its massive data breach. Meanwhile, its CEO has provided some

Software

EFF questions US government’s software flaw disclosure policy

It’s not clear if the U.S. government is living up to its promise to disclose serious software flaws to technology companies, a policy it put in place five years ago,

Mobile

Ponemon Study Reveals Startling Lack of Security In Mobile Apps

Demand for mobile apps is putting users’ private information at risk. The pressure is so great to release new mobile apps that three-quarters (77%) of companies surveyed by Ponemon and

BYOD/Big Data

BYOD and Beyond: Balancing User and Enterprise Needs in Mobile Security Policy

Bring your own device policies are a key part of any enterprise mobility strategy, but that’s just the start. BYOD policies must address acceptable use, enforcement and privacy. Read the