Quantcast
Channel:
Browsing latest articles
Browse All 10 View Live

The Sobering Facts About Cyber Crime

It’s easy to feel complacent about online security when you’ve invested in the latest hardware and software protection. Unfortunately, what a lot of organizations don’t realize is that even the best...

View Article


Mobile Device Management

The rise of bring your own device (BYOD) policies in corporate network environments has led to greater flexibility for employees, as well as lower infrastructure costs for businesses and government...

View Article


Have you ever had the challenge of deploying a SIEM in your environment?

Managing security with a SIEM in any environment is a complex adventure. Protecting your data and infrastructure and meeting regulatory requirements may seem like a daunting task. It is difficult...

View Article

Managing Privileged Access to Sensitive Resources

Current trends in network computing that favor virtualization and cloud computing — combined with the financial imperative to outsource services and consolidate data center resources — have made...

View Article

Image may be NSFW.
Clik here to view.

Peer-to-Peer Communication Challenges in the Cloud

Security practices have changed significantly in the last decade. It used to be sufficient to set up firewall rules to close the intranet off from the internet. Nowadays, companies rely more and more...

View Article


Image may be NSFW.
Clik here to view.

17 Best Practices for Maintaining Data Security in a Business Environment

No matter what business you’re in, protecting your data from threats and accidental compromises is a critical concern. Several recent high-profile incidents have exposed just how vulnerable retailers,...

View Article

Security and Operational Efficiency

Too often, IT managers think of their job in terms of striking a balance between institutional security and operational efficiency. The truth is, however, that an agile security posture will be easy...

View Article

How to Implement Server Virtualization in Your Business

In a business environment where IT managers are constantly being asked to do more with less, server virtualization represents an easy way to maximize your existing resources. Although server...

View Article


Understanding Cloud Security Models

When speaking about security and cloud computing, it’s important to distinguish among three separate models for service delivery: public, private and hybrid. Each model represents a different approach...

View Article


Traditional and Software-Defined Networking

Software-defined networking (SDN) has emerged as a buzzword in recent years, though many outside of the IT sector seem uncertain about what the term actually means — especially in relation to cloud...

View Article
Browsing latest articles
Browse All 10 View Live