Along with an opex-leaning cost model, cloud computing’s appeal has included dynamic capacity provisioning where compute and storage resources can be added, moved and removed almost instantaneously. While this helps companies to scale...
Thanks to its inherent "openness," the open source Android OS is vulnerable to a variety of security risks, but how often do people you know actually fall victim to Android malware or other attacks? Is the Android security risk...
The Open Web Application Security Project (OWASP) has released the latest version of the open source Application Security Verification Standards (ASVS). Version 2.1 of the Standards was launched at the AppSec EU 2015 conference and created by the...
Rather than trying (and failing) to prevent every attack, organizations that implement an adaptive model recognize that some attacks will get through. They change their mindset and aim to quickly detect attacks and then respond forcefully to prevent...
It had to be a bit of a jolt for more than 500 exhibitors and thousands of attendees at RSA Conference 2015 last month, all pushing, promoting and inspecting the latest and greatest in digital security technology: The theme of RSA President Amit...
According to the Radicati Group, Microsoft Office 365 is expected to represent 43% of business mailboxes by 2018. For many organizations transitioning to cloud-based services such as Office 365, management of legacy Personal Storage Table (PST)...
The Philippine Long Distance Telephone Company (PLDT) has partnered with IBM to further strengthen its enterprise digital enablement capabilities. The partnership allows PLDT to cohesively bundle IBM Cloud offerings together with PLDT’s...
IT organizations big and small are seeing significant benefits from some of their cloud computing contracts. The value of cloud services deals increased 60 percent in the last three years and the $40 billion global cloud services market is...