- Is "Bring Your Own Identity" a security risk or advantage?
- Insecure Connections: Enterprises hacked after neglecting third-party risks
- Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weakness
- CIOs, CSOs should address cloud sovereignty uncertainty with facts: Gartner
- The week in security: Hackers swarm banks, break for World Cup
Why Encrypt? - Securing email without compromising communications
There’s an old saying that a ship is safe in the harbour, but that’s not what ships are for. The same can be said of enterprise data. If a company’s success is increasingly determined by its ability to act on information, a fundamental requirement of that success is the enablement of unfettered communications between co-workers, partners and clients. Read more.
Please supply your email address to access the content.
- Qualcomm planting seeds for 4K video, silicon brains in mobile devices
- Mobile devices to get faster LP-DDR4 memory next year
- Mozilla knocks off 'interim' label, names Chris Beard CEO
- Google's next frontier: What it means to be healthy
- Stanford researchers show off blueprint for self-healing lithium battery
- JC Penney: Finding the right customer engagement strategy
- Brands demonstrate a hotchpotch of IT/marketing relationships
- Metrics a must for making the most of content marketing, says Forrester
- Ticketek: Modern marketing strategy is about treating people as people
- Salesforce.com launches Sales Reach for real-time selling and marketing