Top 10 IT predictions for 2013
The final RIP for strong passwords, the failure of smart phones and tablets to kill off the PC and the rise of 4K displays are what’s in store for 2013
Refers to the software and hardware employed in securing information technology data and systems from intrusion and attack. This can range from end-point or perimeter security to data centre protection, sometimes delivered by appliance, as well as access control and application-level security.
The final RIP for strong passwords, the failure of smart phones and tablets to kill off the PC and the rise of 4K displays are what’s in store for 2013
A new mobile screen protector from the makers of the post-it note
According to the Mayans, the end of the world begins Friday. Is your technology infrastructure ready for Armageddon?
CDN CURATED: The company has prepared with virtualization, more powerful servers and traffic shaping
Allstream teams up with Arbor Networks in Cloud SignalingSM Coalition
With data breaches so often in the headlines, Symantec looks at the types of information that typically get exposed
A global BYOD survey finds many Canadian companies are sticking by BlackBerry OS – but for how long?
Security experts can use gestures or voice to control HD surveillance video with Avigilon’s ACC 5.0
A Twitter user unknowingly live blogged signs of the attack, and cybercrooks are riding the news to spread malware
Norton 360 version 5 offers users faster performance and more powerful protection
WikiLeaks is not the actual problem
Symantec’s Disaster Recovery survey finds more education and awareness is needed in the large enterprise market
Users may not always punish companies for security lapses, but that doesn’t mean IT can afford to let security slide