Up to 180,000 Vermont accounts on a state vendor's job search website may have been compromised in a data breach, Gov. Phil Scott announced Thursday, making the breach much larger…
A Zscaler research report has shown that 54 percent of threats blocked in its internet security cloud are hidden in SSL traffic, with 600,000 malicious activities per day using SSL.…
Protecting your business assets — data, devices, programs, infrastructure, and people — requires a 24/7 approach that blends protection, detection, and resolution capabilities. The latter two are critical, because it’s…
Most of the businesses that we work with have some of their IT solutions hosted or delivered remotely from cloud providers. What remains on site are usually servers that provide…
Today’s retailers have so much to know about customers — who they are, what they buy, when they buy, how they like to pay, and how they feel about the…
The unauthorised use of personal file-sharing apps at work is a growing problem that can no longer be swept under the rug and ignored. On one hand these services, such…
AUSTIN – Information security has never been more front and center than it is now. The recent hacking of the Democratic National Committee; the implications that Russia — a sovereign…
In a recent Heavy Reading survey of more than 90 mobile network operators, network performance was cited as a key factor for ensuring a positive customer experience, on a relatively…
Virtual environments could be creating real headaches for network managers, with network edges in many organisations being stretched and distorted due to increased virtualisation, cloud migration, the Internet of Things…
This HPA Tech Retreat devoted three sessions to an issue that’s grown in importance over the last few years: cybersecurity. The digitization of workflow, media, distribution and even projection has…