Home Tags #security

Tag: #security

VMware driving container coopetition

1
Is software really eating the world? Certainly a revolutionary conjuncture of trends would suggest this is so. While new digital models are displacing traditional...

Big Brother is watching

0
We tend to think of our phones and computers as personal devices. They live close to our bodies, and are privy to confidential information....

Infographic on application security

0
Arxan, a supplier of application security products, has released a very interesting infographic detailing statistics around software piracy and security. The trends are mostly...

Cisco building and branding its IoT portfolio

0
Nothing succeeds like success, but uneasy lies the head that wears the crown. For eight years now, Cisco has mounted an effective campaign to...

CenturyLink CSO on defence against the “five bad actors”

0
Dave Mahon brings impressive credentials to his current position as Chief Security Officer at CenturyLink. Former supervisory special agent with the FBI, Mahon began...

Cloud services going rogue on corporate intranets

0
For years organizations have been battling silos. Whether it’s the data centre, communications infrastructure or software, over the past decades IT departments have leveraged...

Enabling tools can put security practices on high alert

0
A network performance specialist by profession and principal with The Technology Firm, Tony Fortunato has spent his career working with enterprises to solve issues...

VMware builds company and community support for mobile deployments

0
The mobile revolution is well underway and shows no signs of waning. At the hardware level, smartphone penetration has moved into hyperdrive: according to...

Securing the cloud to client continuum

0
The digitization of business process and personal practice is having a profound impact on productivity at work and in daily life. But our growing...

CSA launches new certification

0
As the cloud becomes more and more a part of our IT world, the elephant in the room emerges: security. Companies have held back...

Frameworks and culture in Roadmaps to Cloud Success

0
A book as the source of knowledge in a world of digital communication? Surely not! In fact, not one, but two books served as...

Cloud Security Alliance: Sanctioned and unsanctioned apps in cloud ecosystems

0
InsightaaS: Today's featured post, from the Cloud Security Alliance, actually has an even-longer (and for some reason, all caps) title than is presented above: SECURING THE...

Scaling EHR with CenturyLink cloud

0
Founded in 2002, Nightingale is one of the largest providers of cloud-based Electronic Health Record (EHR) and practice management solutions to Ontario healthcare organizations,...

IBM: DroppedIn: Remotely Exploitable Vulnerability in the Dropbox SDK for Android

0
InsightaaS: Research shows that cloud is the most important issue on the IT agenda for 2015, followed closely by mobility; and it also shows...

ESG: Antivirus Usage Patterns Reveal Hints about Its Effectiveness

0
InsightaaS: ESG is a Massachusetts-based analyst firm that offers a wide range of research and advisory services. Today's featured post is based on a...