|
Video/Webcast: Check Point Software Technologies Ltd. Join us live April 5th @11:00 AM EDT for this webcast to understand the trends that are disrupting the way security is managed today. Read More ▶ |
Reports that Apple will increase its use of Google's Cloud Platform while simultaneously building up its own data centers and decreasing its spend on Amazon Web Service's cloud amount to somewhat of a coup in the cloud wars. Read More ▶ |
|
Two recent reports confirm that your greatest security threat is your users, not outside hackers. Read More ▶ |
|
Cloud Wi-Fi startups Cloud4Wi and Relay2 share news about new or updated offerings aimed at helping organizations get more from their wireless networks. Read More ▶ |
|
|
Enterprise lighting, energy management and other sensors are moving to an architecture where the device hitches a ride on the Wi-Fi network, but only to connect to its service in the cloud: the WLAN is essentially transparent in the architecture. But first, an IoT sensor must be configured to connect to the WLAN. Read More ▶ |
|
Manufacturers have typically resisted putting their complex ERP systems in the cloud. But a report from Technology Evaluation Centers identifies several ways that could change in the future. Read More ▶ |
|
Apple has moved some of its iCloud business from Amazon Web Services to Google’s cloud service, in what is seen as a bid by the iPhone maker to diversify its suppliers. Read More ▶ |
|
Apple's iMessage system has a cryptography flaw that allowed researchers to decrypt a photo stored in iCloud, the Washington Post reported on Sunday. Read More ▶ |
|
In tough economic times, companies need every ounce of efficiency. That’s where the cloud comes in. Read More ▶ |
|
CISOs must plan for expansive cloud growth AND a lack of cybersecurity professionals with cloud computing skills Read More ▶ |
|
White Paper: SecureAuth SecureAuth is pushing the limits of Adaptive Authentication by introducing behavioral biometrics. Behavioral biometrics is another method for detecting threats with the ability to monitor and analyze keystrokes, mouse movements, and touch dynamics. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS How to respond to ransomware threats Read More ▶ |
Most-Read Stories |