Eighty per cent of employees are potentially putting their companies at risk through use of unauthorised Software-as-a-Service (SaaS) applications on corporate networks. The extent of so-called "shadow IT" is revealed in a study for ...
With its $7.2 billion agreement to buy Nokia’s handset business, Microsoft is in a position to surpass Apple and Android smartphone makers in providing an enterprise-class mobile platform, experts say. However, whether Microsoft is ...
Tags: Nokia, Mobile Enterprise
The number of mobile malware apps has jumped 614 percent in the last year, according to studies conducted by McAfee and Juniper Networks. The Juniper study – its third annual Mobile Threats Report – showed that the majority of ...
Tags: Computer Products, Mobile Malware
Check Point has published its second mobile security report, revealing that 79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs. The report found mobile security incidents cost more ...
China's remarkable success at infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology expertise. State-sponsored hacking ...
Tags: Computer Products, Hackers, networks
Dell has pulled together products it gained from recent acquisitions into a series of BYOD offerings, though it faces the challenge of selling them at a time when the company's ownership hangs in the balance. The offerings are aimed at ...
Tags: Dell, Byod Market
Facebook Home, the new app that replaces the home screen on an Android smartphone, should be banned from corporate networks to avoid unnecessary security risks, experts say. Facebook introduced Home on Thursday, aiming to give its 1 ...
Organizations face malware-related events that bypass traditional defense technologies on their networks every three minutes, according to a new report released Wednesday by security vendor FireEye. "This activity can include the receipt ...
Tags: Computer Products, software
Despite what he sees as shortcomings of Microsoft’s real-time communications platform, Lync, businesses will see value to some of its features, and supplement those with products from Avaya, says Avaya CEO Kevin Kennedy. “Are ...
Mozilla is taking steps to limit the risk of powerful subordinate Certificate Authority (CA) certificates falling into the hands of attackers and potentially being used to issue rogue certificates for use in SSL snooping attacks. The ...
Tags: Mozilla, browser maker, browser
A faulty antivirus update issued by Kaspersky Lab on Monday left many of its home and business customers unable to access any websites on their computers. Systems administrators using Kaspersky Endpoint Security (KES) on their corporate ...
Softros LAN Messenger became an irreplaceable software in numerous companies. With the help of this messenger you will be able to send files, messages between computers on your employees, sending mass alerts can significantly accelerate ...
Tags: Softros LAN Messenger, software, workflow
As the Senate prepares to take another stab at passing a comprehensive cyber security bill, a new report shows the number of cyber attacks growing dramatically from China. China has accounted for the largest percentage of attacks since ...
Tags: Senate, cyber security bill, cyber attacks
MSIG Insurance (Singapore) has partnered with global underwriting agency DUAL to launch its financial lines capability in the Singapore market, to help address needs of its private and corporate networks. DUAL provides specialised ...
Showing what can happen when companies don't periodically review network logs, a software developer working for a large U.S. critical infrastructure company hired a Chinese firm to do his job so he could spend time surfing Reddit and ...
Tags: network logs, software, critical infrastructure, IT