Featured Articles

  1. Report Highlights Vital Role Of Supercomputing For American Future
    5/10/2016

    The U.S. risks being surpassed by China, Japan, and EU in supercomputing race.

  2. POS Shipments Accelerated In EMEA Last Year
    5/9/2016

    New research finds a 5.2 percent increase over 2014 levels.

  3. Is Fingerprinting Next For Credit Card Security?
    5/9/2016

    Miniature fingerprint scanners inside credit cards could satisfy bank concerns about card fraud.

  4. Webroot 2016 Threat Briefing Webinar
    5/5/2016

    2015 was another record year for cybercrime, during which more malware and malicious IPs, websites, and mobile apps were discovered than in any previous year. It will come as no surprise that the cybercrime ecosystem continues to thrive, given new innovations and little in the way of risk for those who choose to participate. At Webroot, we believe it is possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they employ for their attacks.

  5. Healthcare Organizations Still Trust Slow-Moving Compliance Regulations Despite Risk
    5/5/2016

    The regulatory environment in healthcare is becoming increasingly complex, but healthcare organizations are still managing to keep up. Unsurprisingly, this has created an environment where compliance with regulations frequently takes precedence over actual security.

  6. POS, Payment Processing, Data Collection, And Physical Security News
    5/4/2016

    Creditcall and Miura Systems recently announced that retail developers, ISVs, and VARs can now integrate the Miura M007 mPOS PINpad into Windows- and Linux-based retail POS infrastructure, in addition to iOS- and Android-based mPOS solutions, by using Creditcall ChipDNA SDKs.

  7. Managed Services, Backup And Disaster Recovery, And Networking News
    5/4/2016

    IT professionals can now protect their virtual environments through socket-based pricing for StorageCraft ShadowProtect SPX. The new licensing model allows IT administrators to purchase licenses based on the number of CPU sockets on the host, both VMware and Microsoft, and protect an unlimited number of virtual machines per licensed socket.

  8. ICIT: Layered Defense Is Only Way To Combat Ransomware
    5/3/2016

    Endpoint security should be the first layer in the complex defense against attacks.

  9. Increased Use Of Multi-Vector DDoS Attacks Targeting Companies
    5/2/2016

    Report identifies common tactics and offers key takeaways for CIOs.

  10. 8 Essential Helpdesk Tools For MSP Success
    4/29/2016

    How to win and keep your customers with helpdesk tools to meet their needs.