Security / Features

Seattle tries out mobile voting

But voter skepticism about online security has some Washington state officials responsible for general elections wary of rolling the tech.

Written by Lucas Mearian28 Jan. 20 22:00

5 key changes to the H-1B visa program

Changes to the H-1B visa program went into effect April 1, aiming to improve and streamline the application and selection process of foreign national talent.

Written by Sharon Florentine13 Sept. 19 20:00

Why blockchain-based voting could threaten democracy

As the desire to increase voter turnout remains strong and the number of online voting pilot projects rises in the U.S. and abroad, some security experts warn any internet-based election system is wide open to attack, regardless of the underlying infrastructure.

Written by Lucas Mearian12 Aug. 19 20:00

7 Top Tools for Single Sign-on

Okta, OneLogin score high in test of solutions that beef up app security and cut help desk calls.

Written by David Strom27 June 19 00:54

What is Cryptojacking?

'Cryptojacking' is a term used to describe the action of secretly using a computer to mine cryptocurrency.

Written by By Sean Bradley09 March 19 04:06

ICANN urges adopting DNSSEC - now

Continuing attacks on directory name services have prompted ICANN to prompt enterprise DNS uses to push their suppliers for DNSSEC services to block some of these attacks that can compromise corporate data.

Written by Michael Cooney26 Feb. 19 08:57

Google Smart Lock: The complete guide

Google Smart Lock can simplify security and save you time on Android, Chrome OS, and even Mac and Windows. Are you taking advantage of all it has to offer?

Written by JR Raphael12 Dec. 18 22:00

Cisco closes US$2.3B deal for unified access, multi-factor authentication security firm Duo

According to Cisco, Duo’s zero trust security model authorizes secure connections to all applications based on the trustworthiness of users and devices. Duo’s cloud-delivered technology lets IT professionals set and enforce risk-based, adaptive access policies and get enhanced visibility into users’ devices and activities.

Written by Michael Cooney02 Oct. 18 02:27

Cisco unearths 13 “High Impact” IOS vulnerabilities you need to patch now

Cisco has exposed 13 vulnerabilities in its IOS and IOS XE switch and router operating software that the company said should be patched as soon as possible. The vulnerabilities were detailed in Cisco’s twice-yearly dump of IOS exposures and all have a High Impact security rating and should be evaluated by users as soon as possible.

Written by Michael Cooney28 Sept. 18 04:34

Cisco pays cool US$2.3 billion for security company Duo

Cisco said that Integration of its network, device and cloud security platforms with Duo Security’s zero-trust authentication and access products will let customers to quickly secure users to any application on any networked device.

Written by Michael Cooney02 Aug. 18 23:34
  • Leveraging data and backups to maintain business continuity

    Veeam

    Veeam® recognizes the new challenges companies across the globe face in enabling the Always-On Enterprise™, a business that must operate 24/7/365. To address this, Veeam has pioneered a new market of Availability for the Always-On Enterprise™ by helping organizations meet recovery time and point objectives (RTPO™) of less than 15 minutes for all applications and data, through a fundamentally new kind of solution that delivers high-speed recovery, data loss avoidance, verified recoverability, leveraged data and complete visibility. Veeam Availability Suite™, which includes Veeam Backup & Replication™, leverages virtualization, storage, and cloud technologies that enable the modern data center to help organizations save time, mitigate risks, and dramatically reduce capital and operational costs, while always supporting the current and future business goals of Veeam customers

  • []