Cloud

The cloud technology which is becoming the key to faster collaboration and data transfer is also enabling cybercriminals to quickly spread ransomware. Businesses are moving to the cloud, taking advantage of the increased speed and efficiency it provides for data transfer and

Gartner, Inc. highlighted the top technologies for information security and their implications for security organizations in 2017. Analysts presented their findings during the Gartner Security & Risk Management Summit, being held here through Thursday. “In 2017, the threat level to

Juniper Networks has announced two new firewalls in its SRX line with throughput up to 40Gbps. The company also announced Policy Enforcer, software that can push security policies to access switches to block or quarantine compromised hosts. The products were

Communications and networking might be overlooked by smart cities, missing out on the potential capabilities of partnering with telecoms to build “heterogeneous networks” that deliver service to multiple platforms. The Global Mobile Suppliers Association (GSA) claims — in its latest

It’s often assumed, at least within tech circles, that traditional enterprise is slow to adapt to emerging trends. That may have been true in the past, but it is becoming increasingly less so. After seeing smaller players maneuver quickly to

Some companies will pay hackers up to US$1 million in ransoms to claw back stolen data according to a poll by the Cloud Security Alliance. The survey garnered 209 respondents of which half were in IT security and a third

The Cloud Security Alliance is a multi-stakeholder effort that is all about (surprise, surprise) securing the cloud. While the CSA has been active for years, it’s still a challenge to keep up with cloud, as both use cases and cloud

Microsoft on Monday revealed that hospitals and other IT shops should expect the next generation of its database to be available on June 1. Dubbed SQL Server 2016, the forthcoming iteration brings a focus on analytics, cloud capabilities, data encryption