Recent Articles
-
Tablets Hold Promise, Challenges for Channel
With the market for tablet computing devices exploding over the past year, value added resellers (VARs) have many opportunities to tap into the market to supply their customers with these versatile and mobile computers, which offer many advantages over desktop PCs and notebooks. Channel partners should also keep in mind the inherent challenges and limitations…
-
Users Careless About Security, Ignorant About Malware Threat: Survey
When it comes to enterprise security, user misconceptions of safe online behavior may be the weakest link, according to two recent research studies. Users are in the dark about the "reality" of malware threats, according to G Data Software’s global survey released June 24. The massive survey included responses from nearly 16,000 users worldwide, of…
-
Big Data Challenge More Than Managing Volumes of Data: Gartner
Many IT leaders are attempting to manage "big data" challenges by focusing on the high volumes of information to the exclusion of the many other dimensions of information management, leaving massive challenges to be addressed later, according to IT research firm Gartner. "Big data" is a popular term used to acknowledge the exponential growth, availability…
-
Cyber-Security Breaches Hit 90 Percent of Businesses: Report
A survey of U.S. IT security professionals, conducted by Ponemon Institute and sponsored by Juniper Networks, found the threat from cyber-attacks today is nearing statistical certainty and businesses of every type and size are vulnerable to attacks. Organizations today are experiencing multiple breaches, with more than half (59 percent) of respondents citing two or more…
-
Security Holes Abound in VMs Deployed by Amazon Web Services Customers
German researchers uncovered multiple security problems within Amazon’s cloud-computing services caused by customers ignoring or forgetting security tips. Researchers looked at some 1,100 Amazon Machine Images and found a majority of them contained security keys used to authenticate with other services and servers, Thomas Schneider, a post-doctoral researcher in the System Security Lab of Technische…
-
Disk Encryption a Priority for Businesses
As data protection mandates become stricter and high-profile instances of data loss proliferate in the media, a survey of more than 360 attendees at Infosecurity Europe 2011 found that two-thirds of respondents (67 percent) hold disk encryption to be an IT security priority. The survey also found that more than two in five respondents (42…