Security | News, how-tos, features, reviews, and videos
Public cloud providers offer inexpensive application hosting and data storage services. However, relying on a service provider to secure your data is risky business, so you need to take your own precautions. Here's what it takes to ensure securi
Amid a week of economic meetings between top U.S. and Chinese officials, lawmakers hear warnings about escalating costs of theft of U.S. firms' intellectual property.
When it comes to backup and recovery, IT is struggling to meet business demand within most enterprises--and the problem stands to get only worse. EMC believes the answer is a more open and agile protection storage architecture.
BlackBerry today released new BES 10 "Secure Work Space" features that let IT administrators manage personal and corporate data separately on Apple iOS and Google Android devices.
Cyber resiliency aligns the strategies, tactics, and planning of traditionally siloed disciplines for an integrated, holistic approach to cyber incident response.
The database specialist, which boasts data compression technology that can reduce storage footprint by up to 97 percent, upgrades its database with a host of enterprise-grade security features and search functions to help large enterprises put big da
New APIs in the forthcoming HTML5 make it much easier for Web applications to access software and hardware, especially on mobile devices. The W3C is taking privacy seriously as it puts the finishing touches on HTML5, but there are still some importan
The BYOD policy at a California law firm earned the CIO the nickname of Big Brother. However, the sarcasm stopped when he sprang into action and saved the day when an attorney's smartphone was swiped. The case represents the love-hate relationsh
The future of IT will be systems that are intelligent enough to detect and solve problems without human interaction, CIO.com columnist Rob Enderle conjectures. This will be great for analytics but bad for security--and it may leave IT workers reachin
The phrase 'don't boil the ocean' is often used to describe efforts to introduce IT to healthcare organizations. These 11 tips will help healthcare CIOs make incremental changes that improve business practices without panicking end use
Hackers are stealing credit card and other sensitive information from ecommerce sites. To protect (and reassure) your customers, it's imperative to know how to protect your ebusiness and your sensitive customer data. Ecommerce and security exper
Sponsored Links