Topic: security

CeBIT 2014 puts innovative software on display

For the Internet of Things, cloud development, Big Data and security, there was something for everyone … continue reading

SharePoint’s Most Wanted

HiSoftware identifies three troublemakers your company must watch out for … continue reading

Study: Android accounted for 97% of mobile malware in 2013

Most malware found outside the U.S. with Google Play accounted for less than 1%, according to security firm F-Secure … continue reading

RSA Conference shows security is in the hands of users

A shift away from central control of security has forced many enterprises to find end-user solutions at RSA Conference … continue reading

SD Times Blog: Errors and bugs and patches, oh my!

Two big bugs are lingering for far too long. Well, actually one of them was just (finally) patched today … continue reading

Majority of apps have security vulnerabilities, report says

The most common security vulnerabilities include cross-site scripting and information leakage according to Cenzic … continue reading

‘Honey Encryption’ bamboozles hackers with fake data

Designed to fight back against things like brute-force attacks, deception-based countermeasure will get wider exposure in May … continue reading

Zeichick’s Take: How in the world did you guess my password?

Businesses share some responsibility in securing their customers passwords, even when the passwords are easy to crack … continue reading

SD Times Blog: ‘123456’ tops ‘password’ as most common password of 2013

SplashData’s list of the most popular passwords was compiled from 2013 public hacks, including the Adobe breach … continue reading

Computer security researchers launch boycott of RSA conference

Security professionals are starting to withdraw from conference after a report revealed a contract between RSA and the NSA … continue reading

Intel CEO Unveils Products, Initiatives and Collaborations for More Immersive, Intuitive Experiences and Increased Device Security

Brian Krzanich demonstrated wearable device capabilities, and conflict-free microprocessors during his presentation … continue reading

Securing SharePoint: Understanding your data

Before storing your data in the cloud, know the kind and sensitivity of that data … continue reading

DMCA.com Protection Status