Samsung Knox smartphones will include mobile security software from Lookout to protect business users from mobile threats, the San Francisco company said Tuesday. The deal is part of Lookout's plan to build and offer security products for ...
Tags: Samsung, Smartphones, Computer Products, Consumer Electronics
In new jobs after graduating from university, Eric Perriard and Tom Wright found their employers could articulate grandiose strategies for their businesses. But there was little connection to how the average employee could help out. ...
Tags: Computer Products, software
Piers Linney, co-founder and CEO of cloud services and unified communications company Outsourcery, believes that it will take the cloud between five and 10 years to fully mature. In an interview with Computing, the entrepreneur, who has ...
Tags: Computer Products, software
If US intelligence agencies ban the computers of a Chinese company from classified networks should companies also avoid the same products? What if the vendor is one of the world’s largest PC makers? Those questions are not academic. ...
Tags: China-Based Lenovo
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal. Due to metrics and basic job requirements, end user and network ...
Tags: Computer Products, software
New research has shown that the vast majority of businesses are exposing sensitive corporate data to cyber-criminals by failing to implement effective BYOD strategies. The report, released this week, found that just over half of the 570 ...
Tags: Computer Products, software
More and more workers around the world are bringing their personal mobile devices to the office daily, and companies appear to be having trouble keeping up with the trend. About 60 percent of organisations acknowledged they either don't ...
Tags: Computer Products, software
The Houses of Parliament want to move to Microsoft Office 365, and will mitigate the risk of the US Patriot Act by making contractual agreements to ensure sensitive data sits in Europe. At the Cloud World Forum in London Olympia today, ...
Tags: Computer Products, software
Google is not obligated to delete sensitive data from its search index, despite being subject to EU privacy legislation. That's the view of a top adviser to the European Court of Justice about a case concerning whether individuals can ...
Tags: google, Data, Computer Products
Businesses risk failure to comply with privacy and data protection laws due to the rise of"regulated data"being accessed via smartphone and tablet devices. So says a new report by independent research firm Ponemon Institute and security ...
Tags: Mobile Devices, IT, Businesses risk, privacy
U.S. consumers should be able to reclaim control of their personal data from data brokers, websites and other companies, a member of the U.S. Federal Trade Commission said Wednesday. Commissioner Julie Brill, a long-time privacy advocate, ...
Tags: Personal Data, FTC Commissioner
According to Protiviti’s 2013 Security and Privacy Survey, a large number of companies are not adequately prepared to respond to a data breach of IT security crisis, despite a broader recognition that cyber threats are more prevalent. ...
Tags: Data Breaches, Security
Enterprises are under heavy pressure to change their approach to IT security because of a "nexus of forces" that include big data, social networking, mobile and cloud computing, according to Gartner. Ray Wagner, managing vice president of ...
Tags: Computer Products, software
Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data ...
Tags: Data encryption, Spy-Proof, Surveillance
A defiant Edward Snowden resurfaced in Hong Kong today vowing to fight any U.S. efforts to extradite him on charges that he leaked classified documents describing two secret government data collection programs. In comments to the South ...
Tags: NSA, Classified Data, Edward Snowden