News & Highlights Archive
News & Highlights
(Source: Forbes) With software that’s designed specifically for the cloud, employees get access to data anywhere and on multiple devices. The move to the cloud means we’re now in a complex
Read More
News & Highlights
(Source: Digital Journal) Deerfield Beach, FL — (SBWIRE) — 03/27/2018 — The Global Data SecuritySoftware Market report by QY Market Research is an insightful analysis of the existing, future, and historic
Read More
News & Highlights
(Source: registrarjournal.com) Shares of BackBerry appreciated by 4% on Tuesday after the tech firm indicated that it would offer security to Microsoft’s Office software. The moves follows high-profile data breaches in the
Read More
News & Highlights
(Source: Computerworld) This will also help Mac adoption in those industries.” Enterprise users may also want to explore a new feature that lets Jamf users manage User Approved Kernel
Read More
News & Highlights
(Source: ZDNet) However, when the malicious code executes on a victim’s PC, the malware will first attempt to remove security software by targeting Windows Defender and Malwarebytes, or by specifically querying
Read More
News & Highlights
(Source: Washington Examiner) The Justice Department this week challenged a Russian-based software securityprovider’s lawsuit asking a federal court to overturn a Trump administration ban on its products. The phasing out
Read More
News & Highlights
(Source: Forbes) Keeping all those application links straight and easily accessible without publicly advertising the resources can be challenging. But with a virtual desktop, it is a simple task
Read More
News & Highlights
(Source: Global Government Forum) And right now, apart from the laudable general recommendations developed by the National Institute of Standards and Technology, pretty much the only source of advice
Read More
News & Highlights
(Source: Channel Partners) PRESS RELEASE — Downers Grove, Ill., March 21, 2018 – CompTIA, the leading provider of vendor-neutral, performance-based certifications for the information technology (IT) industry, today introduced
Read More
News & Highlights
(Source: Dark Reading) Each interaction with a third party needs multiple security controls, and the eventual dependency chain carries the risk of being as strong as its weakest link. This third-party
Read More