Featured Articles

  1. Managed Services And Video Surveillance News
    8/29/2016

    CompTIA Study Highlights IoT Opportunities, ConnectWise To Provide Microsoft Azure Support, Sophos Introduces Cross-Platform Always-On File Encryption, Genetec Unveils New VMS Version, and StorageCraft To Launch Cloud Data Protection Solution.

  2. POS, Payment Processing, And Data Collection News
    8/29/2016

    Seiko Introduces New Mobile Printer Line, Datalogic Announces New Multipurpose Retail Device, Zebra Unveils New Wearables Line, Vantiv Launches New Developer Resources, Creditcall, Elavon Address Unattended EMV, and Touch Dynamic Announces The Quest II Tablet.

  3. Adaptive Security Extended End-To-End
    8/29/2016

    Industry’s first end-to-end adaptive security technology proves to be disruptive. By Christine Kern, contributing writer

  4. Your Customers Are Telling You What They Want But You're Not Listening
    8/29/2016

    How well do you really know your customers? It’s a question businesses need to be asking themselves more and more because, even if you feel you know your customers well, there’s always more work to be done. By Rick Delgado, contributing writer

  5. Scorecard Evaluates Civil Rights Safeguards Of Police Body Camera Programs
    8/26/2016

    Results demonstrate a “nationwide failure” to protect civil rights. By Christine Kern, contributing writer

  6. Research Shows DNSSEC Vulnerabilities Are Prolific
    8/26/2016

    Neustar Report finds that savvy DDoS attackers are using our defenses against us. By Christine Kern, contributing writer

  7. Covering Your A$$: Next-Gen Threat Landscape
    8/25/2016

    Today's advanced malware is increasingly difficult to remove and even harder to detect in the first place. In this presentation, we examine the modern threat landscape and discuss the shortcomings of traditional antivirus, as well as how organizations can stay ahead of the malware curve. Malware authors aren't too concerned about what traditional security is capable of blocking, since they've formed reliable tactics to circumvent that protection. Either by leveraging social engineering or advanced evasive tactics, modern malware spells an uphill battle for traditional defenses.

  8. HIMSS Cybersecurity Survey Reveals Shift In Priorities For Providers
    8/25/2016

    Q3 and Q4 just might be the perfect time to upsell security solutions By Megan Williams, contributing writer

  9. White House Releases Federal Source Code Policy To Advance Sharing Across Agencies
    8/25/2016

    New policy faces criticism as not going far enough. By Christine Kern, contributing writer

  10. Google Drive, Facebook, LinkedIn Named Most Useful Apps For SMBs
    8/22/2016

    Business owners were asked to rank the top tech tools for 2016 in a new poll. By Christine Kern, contributing writer