IT Brief UK - Technology news for CIOs & IT decision-makers

Laptops stories - Page 27

Leak

Cyber threats coming from the inside

Thu, 21st Apr 2016
#
cybersecurity
#
solarwinds
#
solar power
IT security awareness among business leaders, especially in government, is increasing due to company data leaks, says SolarWinds.
Wan

Wearables a security risk, says Centrify

Wed, 13th Apr 2016
#
wearables
#
cybersecurity
#
centrify
New research warns of security risks in the enterprise with the increasing use of wearables, as two thirds of owners use no login protection.
Security image

Carbon Black 'undisputed leader' of next-gen endpoint security market

Fri, 18th Mar 2016
#
endpoint protection
#
risk & compliance
#
edr
Carbon Black has been named a 'clear leader in terms of both market share and revenue' by Enterprise Management Associates (EMA).
Toy

Sex toys and cyber crims, oh my

Wed, 16th Mar 2016
#
cybersecurity
#
trend micro
#
tablets
At a news conference, security firm Trend Micro demonstrated how a smart sex toy could be easily hacked and controlled.
Business solution

IT departments need to up their unified solutions game

Tue, 15th Mar 2016
#
endpoint protection
#
edr
#
cybersecurity
New study reveals IT departments must bolster unified security strategies amid growing endpoint and patching challenges.
Eye data

The four largest threats to your data

Tue, 15th Mar 2016
#
dr
#
cloud services
#
opinion
The warnings about your data are everywhere, but have you ever stopped to think what you're protecting your data from?.
Gettyimages 1327932749

The best way for IT pros to save themselves time

Mon, 14th Mar 2016
#
firewalls
#
data protection
#
network infrastructure
IT pros can save valuable time by investing in employee education on IT security, reducing risks and mitigating errors from uninformed actions.
Digital world

Analyst Opinion: Coming to a device near you – the enterprise digital workplace

Fri, 11th Mar 2016
#
cx
#
martech
#
byod
Persistent and rewarding customer experiences are designed, delivered, and managed using enterprise software and line-of-business applications.
Doodles bae

Passwords are so last year. Today, it's all about the doodles

Fri, 11th Mar 2016
#
endpoint protection
#
edr
#
passwords
In the future, free-form gestures, such as a doodle or signature, may be used in place of passwords to keep mobile devices secure.
Tablet security

Got an Android device? Here's some tips for keeping it secure

Thu, 10th Mar 2016
#
malware
#
cybersecurity
#
operating systems
As Android malware surges, ESET issues some tips on how Kiwis can protect themselves - and how to know if you might have been compromised already.
Wearable

Unmanaged wearables pose threat to the enterprise

Tue, 8th Mar 2016
#
wearables
#
physical security
#
centrify
Wearable device owners in the enterprise are neglecting login credentials, posing a growing IT security concern, warns Centrify RSA Survey.
Byod blue background

Going mobile: How to have secure file-sharing, backup recovery and access

Tue, 1st Mar 2016
#
storage
#
dr
#
endpoint protection
How do you maintain the security of your organisation's data in a world where your employees, contractors and partners are working on mobile devices?.
Eye data drawing

Endpoint data protection: A buyer's checklist

Mon, 29th Feb 2016
#
storage
#
data protection
#
dr
Endpoint data is often one of the most forgotten aspects of an enterprise data protection strategy, yet it is among the most valuable to a company.
Google drive

New app encrypts your data on Google Drive

Thu, 11th Feb 2016
#
encryption
#
cybersecurity
#
google
While numerous methods already exist to encrypt data, Syncdocs is the first solution to provide fully automatic end-to-end encryption for Google Drive.
Future

The 2016 data center: On-demand, on the edge and hyperscale

Wed, 20th Jan 2016
#
hyperscale
#
dc
#
commscope
John Schmidt, CommScope data center solutions lead, offers up his view on the shifts happening in the data center market.
Trust

Organisations need to adopt a zero-trust approach

Tue, 19th Jan 2016
#
cybersecurity
#
exc saltbush
#
tablets
Organisations need to change their attitudes when it comes to network security, and must acquire a zero trust approach to prevent disruption.
Fingerprint

Demand for secure identity solutions grows

Tue, 19th Jan 2016
#
uc
#
wearables
#
cybersecurity
Key trends including ongoing advancements in privacy protection and a more mobile and connected experience will have a big impact on secure identities.
Are you ready

Don't let cyber criminals take you down this holiday season

Thu, 3rd Dec 2015
#
dlp
#
cybersecurity
#
bae systems
Employees must stay vigilant during the holiday season as cyber criminals remain active, according to BAE Systems Applied Intelligence.
Public space

Avoiding the pitfalls of free Wi-Fi

Wed, 25th Nov 2015
#
wireless networks
#
cloud services
#
wifi
Due to ubiquitous adoption of internet enabled mobile devices, consumer demand for 24/7 connectivity has never been greater.
Threats

FireEye extends threat intelligence for enterprise

Tue, 13th Oct 2015
#
breach prevention
#
fireeye
#
threat intelligence
The release enables enterprises to adapt endpoint protection utilising new visibility into their endpoint and insight from cloud and real-time feeds.