Some of the company’s most popular network solutions involve computer repair, cloud computing, cloud service management, VoIP services, data …
Tag: security
Five Airports Are Set to Get Automated TSA Security Screening Lanes


After anticipating extra long airport security lines this year, the Transportation Security Administration has taken steps to fix the problem. Their latest solution involves adding new screening technology to Chicago (O’Hare), Dallas/Fort Worth, Los Angeles, and Miami. They’ll also include a pilot program in Phoenix.
10 data security mistakes to avoid as a startup


Startups move fast, and aren’t always thinking about data security as they rush to get a MVP to market. But they should. Data security is increasingly important. As a new business, a mistake in this area can shut down the company. To help combat the common mistakes, I asked 10 entrepreneurs from YEC the following question: What’s the biggest mistake you see tech startups making in terms of data security right now and why? 1. Blurring the lines between personal and professional devices Bring your own device (BYOD) has gained popularity over the last few years, especially in the startup space. Nobody wants to…
This story continues at The Next Web
Separate Is Good: Developers Shouldn’t Be Responsible for Security
An interesting “separation of church and state” conundrum is bubbling up in the software industry. While the new public cloud model demands developers to take ownership of security, there’s still room and reason for security controls to become an entity handled on their own—separate and transparent from the developer.
Windows 10 Build 14316, Cloud App Security Launch: Microsoft Roundup
What Are the Real Security Risks of the Cloud?
RSS-1
Computer Scientist Seeks Stronger Security Shroud for the Cloud
Dr. Zhiqiang Lin, of the Erik Jonsson School of Engineering and Computer Science at UT Dallas, is working to advance the field of cloud computing, …
ZingBox: Startup brings Cisco, Stanford pedigree to IoT security

ZingBox, an Internet of Things security startup whose founders have ties to Cisco and Stanford University, is working on software that guards IoT devices from threats on the Internet.

May Wang
The year-old company’s focus is upgrading routers and gateways with intelligence to detect when IoT devices are behaving abnormally, indicating that they might be compromised, says May Wang, CTO of the company and a co-founder who spent 14 years at Cisco in its office of the CTO where she was a principal architect.
To read this article in full or to leave a comment, please click here
IDG Contributor Network: IoT security will soon be common in the enterprise, Gartner says
A fifth of all businesses will have deployed IoT-related security by the end of 2017, analyst Gartner thinks.
Dedicated digital security services that are committed to “protecting business initiatives using devices and services in the Internet of Things” will be in place by then, the research and advisory company says.
Gartner made the statement in a press release on its website in relation to a security and risk management summit earlier this month in Mumbai.
‘Reshape IT’
“The IoT redefines security,” Ganesh Ramamoorthy, research vice president at Gartner, said in the press release.
To read this article in full or to leave a comment, please click here
Are your biggest security threats on the inside?
The now infamous Ashley Madison website has had a pretty successful run at helping its clientele be disloyal. So perhaps some would view it as poetic justice if the website became one of the most scandalous breaches in history at the hands of one of its own.
At least that is the conclusion of IT security analyst John McAfee, who noted recently “yes, it is true. Ashley Madison was not hacked – the data was stolen by a woman operating on her own who worked for Avid Life Media.”
If true, the fact that the Ashley Madison breach was due to an internal, and not external, threat shouldn’t come as too big a surprise. Many IT security studies this year have pointed to the growing threat of insider data theft and corporate breaches.
To read this article in full or to leave a comment, please click here
