Featured Articles

  1. Is Fingerprinting Next For Credit Card Security?
    5/9/2016

    Miniature fingerprint scanners inside credit cards could satisfy bank concerns about card fraud.

  2. Webroot 2016 Threat Briefing Webinar
    5/5/2016

    2015 was another record year for cybercrime, during which more malware and malicious IPs, websites, and mobile apps were discovered than in any previous year. It will come as no surprise that the cybercrime ecosystem continues to thrive, given new innovations and little in the way of risk for those who choose to participate. At Webroot, we believe it is possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they employ for their attacks.

  3. Healthcare Organizations Still Trust Slow-Moving Compliance Regulations Despite Risk
    5/5/2016

    The regulatory environment in healthcare is becoming increasingly complex, but healthcare organizations are still managing to keep up. Unsurprisingly, this has created an environment where compliance with regulations frequently takes precedence over actual security.

  4. POS, Payment Processing, Data Collection, And Physical Security News
    5/4/2016

    Creditcall and Miura Systems recently announced that retail developers, ISVs, and VARs can now integrate the Miura M007 mPOS PINpad into Windows- and Linux-based retail POS infrastructure, in addition to iOS- and Android-based mPOS solutions, by using Creditcall ChipDNA SDKs.

  5. Managed Services, Backup And Disaster Recovery, And Networking News
    5/4/2016

    IT professionals can now protect their virtual environments through socket-based pricing for StorageCraft ShadowProtect SPX. The new licensing model allows IT administrators to purchase licenses based on the number of CPU sockets on the host, both VMware and Microsoft, and protect an unlimited number of virtual machines per licensed socket.

  6. ICIT: Layered Defense Is Only Way To Combat Ransomware
    5/3/2016

    Endpoint security should be the first layer in the complex defense against attacks.

  7. Increased Use Of Multi-Vector DDoS Attacks Targeting Companies
    5/2/2016

    Report identifies common tactics and offers key takeaways for CIOs.

  8. 8 Essential Helpdesk Tools For MSP Success
    4/29/2016

    How to win and keep your customers with helpdesk tools to meet their needs.

  9. Unsecured Databases, Unauthorized Vendor Access Cause Of Recent Breaches
    4/29/2016

    Recent data breaches in Pennsylvania and Florida have been connected to unsecured databases and unauthorized vendor access.

  10. What A “Hippie Rock Guitarist With Top Secret Clearances” Has To Do With Managed Services
    4/28/2016

    Jeff “Skunk” Baxter wasn’t involved with any bombs during his days as a founding member of Steely Dan or his five-year run with the Doobie Brothers, however — at least since the mid-1980s — his life has been filled with them. Wait, let me explain. Baxter, 67, closed the ASCII Success Summit held in Milwaukee, WI by discussing his transition from Doobie Brother to national security expert. That’s right; the long-time musician with eight platinum records to his credit (he’s been performing since 1968) has become one of the national-security world’s most well-known counterterrorism experts. In this role, Baxter helps both policy makers and defense contractors better understand the way terrorists think and plan attacks.