Recent Articles
-
Enterprises Need Proper Computer Disposal Policies to Protect Sensitive Data
A new computer, mobile device or other IT equipment generally requires some effort setting up and migrating data. Enterprises also need to spend the time making sure the data is completely removed from the equipment as it is replaced. Organizations do not always stop to consider the security implications of leaving data on obsolete equipment…
-
Enterprise Security Market to Exceed $22 Billion in 2012: Canalys
Canalys announced the results of its latest enterprise security forecasts, indicating that total investment is expected to grow 8.7 percent year-on-year in 2012 to reach a market value of $22.9 billion worldwide. Currently accounting for 11.3 percent of the total market, the antivirus (AV) segment will remain one of the strongest parts of the security…
-
CompTIA, viaForensics Plan Secure Mobile App Developer Credential
A new credential intended for mobile applications developers is being created by CompTIA, the non-profit association for the IT industry, and viaForensics, a digital forensics and security firm, the two organizations announced. The secure mobile application developer credential and corresponding testing services – scheduled for availability in the first half of 2012 – are intended…
-
PCI Security Adoption Lags as IT Budgets Shift: Gartner
Payment Card Industry data security standards may be a hot topic, but a recent survey by IT research firm Gartner found that 18 percent of respondents admitted to not being PCI-compliant, even though the survey data suggested that they should be. The survey of 383 IT managers found trends in buying behaviors and permitted predictions…
-
IP Thieves An Insider Job
IP Thieves An Insider Job The average IP thief is a male employee around 37 years old who serves in a technical position, such as an engineer, scientist, technical manager or programmer. No Title Most IP thieves signed an IP agreement. No Title Close to 65 percent of IP thieves were already out the door,…