Microsoft is talking about its upgraded Lync unified communications platform, revealing client support for more devices, server features for better meetings and collaboration as well as integration with the peer-to-peer voice and video service Skype. While it is clearly a good UC choice for customers with needs that align with Lync’s strengths, it’s not yet […]
Securing enterprise mobility in the BYOD world
With the increasing proliferation of smartphones and enterprise tablet initiatives, the movement of Bring Your Own (BYO) continues to increase, making mobility a top priority among enterprises. It is undeniable that this movement is transforming the role of enterprise IT, and creating a new norm in the workplace. With this shift, enterprises need a complete […]
A five-pillar survival guide for an insecure cyber world
Edward Snowden’s action demonstrated that an ordinary insider with a U.S. security clearance can intercept and distribute highly confidential information, even in an age of complex technology designed to prevent such action. What further risks are there? Here are five pillars to consider in rethinking your approach to data security in a cyber-environment in which […]
HP says open sourcing SDNs is wrong
Vendors such as Juniper Networks that are open sourcing their SDN controllers are pursuing a wrongheaded strategy that misses the point of the technology, HP officials said this week. At the Interop conference and exhibition in New York where HP announced its new SDN SDK and App Store, HP officials were asked why the company […]
Tech secrets for the serious road warrior
Your work increasingly demands that you be able to get things done no matter where you are — so the bigger your mobile tech toolbox, the better. In the past, we’ve described how to accomplish more with popular online tools like Google Calendar, with text-messaging utilities like Web-based personal assistant I Want Sandy, and with […]
The new ‘trust in the cloud’ — intelligence-driven security
A recent report released by the Security for Business Innovation Council (SBIC) indicates that the trends toward cloud computing, social media, mobile and Big Data are the main drivers that affect and change the current IT security scene. With the accelerating worldwide spending on public IT cloud service expected to approach US$100 billion in 2016, […]
M86 Security strengthens Web and email security in Singapore
Millions of enterprises of all sizes are losing over US$100 billion a year to cybercrime and malware attacks and we are now facing a network-security epidemic on a truly global scale. Just recently, the death of Osama Bin Laden has set Facebook and Twitter records, not only in terms of site traffic and social media […]
ASP security tools
When working with an ASP, it is a good idea to ask whether or not they are using specific tools to enhance the security for their end users. There are many tools available that can increase your Internet security, and the list is growing daily. For example, Atalla (http://www.atalla.com) offers self-contained, PCI-based, cryptographic hardware. These […]
Shields Up
Category: Network Security UtilityName of tool: Shields Up Company name: Gibson Research. Price: free URL: http://www.grc.com/ Windows platforms supported: 95, 98, NT, 2000 Quick description: Network connection test tool that examines your computer for potential Internet security breaches. Strom-meter: **** = Very cool and useful Key features: All done via a browser; there is no […]