Fortinet’s new FG 280 POE handles security for smaller networks

Cozumel, Mexico – High-end network security solutions firm Fortinet Inc. is going after the smaller network operations and the SMB space with some of its latest appliance releases. The foundation of the company’s

Published on: January 13th, 2014 Nestor Arellano

IT administrators are shadow IT’s worst culprits

We've all been warned about the dangers of the bring-your-own-device (BYOD) phenomenon - employees are using their personal devices for work, and with those personal devices come their own apps for storage and

Published on: December 6th, 2013 Candice So

Three pointers for BYOD and cloud for SMBs

With the rise of industry buzzwords like ‘cloud’ and the bring your own device (BYOD) trend, it’s hard for small businesses to know where to turn to store their data and keep it

Published on: October 21st, 2013 Candice So

Is “Wrongsourcing” Security Worth the Risk to Your Business?

There are all kinds of reasons to insource operational tasks, especially ones of the IT persuasion. But when organizations choose to insource activities that should instead be outsourced services, that’s what I call

Published on: July 10th, 2013 Claudiu Popa

‘Yes man’ approach to security works best: study

Canada's IT security professionals are coming around to providing a more open IT scenario in the workplace that would allow employees to use their own devices and access social networks, according to a

Published on: March 7th, 2013 Brian Jackson

Dropbox accused of misleading users about data security

By Tony Bradley Dropbox, a provider of cloud-based data storage services, is in hot water with the Federal Trade Commission over claims that it lied and intentionally deceived customers into believing that their

Published on: May 17th, 2011 IDG News Service

Trusteer brings secure browsing to mobile

Israeli company Trusteer is taking its Rapport secure browsing technology into mobile security for the first time, announcing a smartphone and tablet protection system for businesses, Secure Web Access. Designed to pair software

Published on: February 11th, 2011 John E. Dunn

Visa requires merchants to beef up wireless security

Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to

Published on: September 28th, 2010 Ajay Kumar

Girls ‘ignored’ in policy discussions about online media

Having finally started to think about the online activities of girls as distinct from boys, researchers, public policy makers and the news media are still mostly getting it wrong.That's the consensus of panelists

Published on: March 12th, 2010 Grant Buckler

Business ethics – companies don’t always walk the talk

The IT staff at Texas Health Resources Inc. must deliver more than technical functionality. And it needs to deliver more than the business requirements: It also has to meet the organization's ethical standards.

Published on: August 31st, 2009 Mary K. Pratt

Making the case for network security without mentioning ROI

How do you accurately calculate the return on investment (ROI) on network security?The quick answer is you don't.That, at least, is the view of Llewellyn Derry, senior director of security solutions at NEC

Published on: April 9th, 2008 Nestor Arellano