Infoworld-Network and endpoint security may not strike you as the first place to scratch an experimental itch.After all,protecting the company's systems and data should call into question any action that may introduce risk.But IT security ...
Tags: crazy IT security tricks
A new survey by technical support website FixYa indicates that users of the top five cloud storage services are most concerned about capacity, security and missing files. FixYa asked users of its service about the top five issues cloud ...
Tags: issues, FixYa, cloud storage services, capacity, security, missing files
Over half of CIOs fail to test cloud vendors' security systems and procedures before selecting the provider, according to a survey of 250 senior IT decision-makers. The research, conducted by IT recruitment consultancy Robert Half ...
Tags: CIO, cloud vendors, security, UK
If you don't know, you need a better connection to your company's risk managers, who measure risk by what can be insured and what it costs to do so. While the measurement of operational risks is still a bit of a puzzle for CSOs, risk ...
Tags: TCOR, CSOs, risk managers, total cost of risk
IT departments must be prepared to renegotiate IT support and invest in mobile device management (MDM) to support staff using their own devices at work. A survey of 3,796 consumers across 17 different countries by analyst Ovum has found ...
Tags: IT departments, IT, BYOD, Ovum
As staff bring their own devices to work, IT will need to rethink its printing and scanning policies, a study commissioned by Canon has reported. The pan-European survey of 729 users and decision-makers across Europe found that employers ...
Tags: IT, Canon, mobile working, cloud application
Government departments have been given the go-ahead to use iPhones to send and receive sensitive emails, as part of moves to broaden the number of approved public sector mobile devices beyond BlackBerrys. Under new guidelines, civil ...
Tags: iPhone, mobile device, Apple device, BlackBerry
While the bring-your-own-device (BYOD) phenomenon has entered the mainstream with 70 percent of smartphone-owning professionals using their personal devices to access corporate data, almost 80 percent of today’s BYOD activity remains ...
Tags: device, BYOD, enterprise, IT, Ovum
Defence companies can effectively “put a red line through public cloud offerings” because of the security risks involved, according to a senior IT solutions manager at Swedish military equipment manufacturer Saab. Christer ...
Tags: cloud, defence, military, saab, security risk
New visualization tool will search, analyze, and display tweets in the context of location and time LIDV Solutions today announced that a new Twitter visualization feature will be available for the forthcoming releases of its Visual ...
Tags: LIDV Solutions, Twitter, Visual Fusion, Twitter visualization tool
Insurance broker R K Harrison has teamed up with Stroz Friedberg, a global digital risk management firm, to offer complimentary pre-incident consulting services for clients purchasing cyber liability policies through R K Harrison. Apart ...
KPN closed a self-service portal for corporate ADSL customers on Tuesday after it discovered that 120,000 of its 180,000 business clients were still using default passwords, all variants of "welkom01," a company spokesman said Friday. The ...
Tags: KPN, ADSL customers, default password
Hewlett-Packard said in a letter to the U.S. Securities and Exchange Commission that it had determined that its products were procured from a partner that was not informed that their ultimate destination was Syria. HP was responding to a ...
Tags: Area, Channel, HP, Meg Whitman, Middle East, Partner sales, surveillance
Attackers can abuse Facebook’s phone search feature to find valid phone numbers and the name of their owners, according to security researchers. The attack is possible because Facebook doesn’t limit the number of phone number ...
Tags: Facebook, highlightedpost, Mark Zuckerberg, Phone number search, privacy
A year-long investigation by a U.S. congressional committee has reportedly concluded that Huawei Technologies and ZTE pose a security threat to the nation, and the committee is advising U.S. firms to buy networking gear from other vendors. ...
Tags: Huawei Technologies, ZTE, security threat, networking gear