Archived Articles

Back to Vendor Listings

Sometimes Your Employees Go Home; The Case for Securing Home Users

Bring your own devices (BYOD), USB flash drives, signing into compromised personal web-based accounts from work, and shared passwords. These are some of the reasons for information security professionals to train their employee user base, even when it’s about apparent non-work related computing resources. Becoming visible to your non-security enterprise end users as a security resource…

Does the NSA Use Quantum Computing to Break Things?

In the continuing stream of revelations about reported NSA hacking to protect national interests comes more news. Data moving between data centers operated by the world’s largest Internet email companies allegedly was intercepted and collected for analysis because the encryption protections on the data was bypassed. The prevailing theories about how the NSA apparently did this…

Gartner Says “Agility” is Primary Driver for Private Cloud Adoption; Predicts Increased Hybrid Cloud Acceptance

Private cloud computing is a “reality” for half of large enterprises with agility being the key driver, according to Gartner, Inc. In a recent research report, “Private Cloud Matures, Hybrid Cloud Is Next,” the industry analyst firm said cost was an important consideration as well. Security, often cited by IT professionals as the key driver…