If you want to protect sensitive data -- especially if you’re sending it via email or via an online service -- one of these five encryption programs can help.
Security / Reviews
NetSkope edges CipherCloud and Bitglass in test of three ingenious and powerful cloud access security brokers.
New ‘smart’ tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift.
The 2016 presidential contest may the first ever to focus on the impact of the H-1B visa program on U.S. workers, which makes the arrival of a new book about the issue especially timely.
I once co-wrote a book on enterprise email where I likened email encryption to a "sucking chest wound." That was in 1997, when you had to do all the encryption key management on your own, a daunting task to say the least.
The old days of straightforward antivirus software packages are gone -- victim of a changing threat scene in which the dangers are more complex than ever and come from multiple sources.
Once upon a time, Symantec's brand of Norton security software had one of the most confusing lineups around -- products included Norton 360, <a href="http://www.computerworld.com/article/2488677/application-security/7-all-in-one-security-suites-anti-malware-for-all-your-devices.html?nsdr=true&page=5">Norton 360 Multi-Device</a>, Norton Anti-Virus and Norton Internet Security. Trying to decide which product was the best for you -- not to mention the best priced -- was no picnic.
McAfee LiveSafe is the best product in McAfee's sizable security portfolio. Its suite offers protection for an unlimited number of Windows PCs, Macs and Android and iOS devices, along with a Web dashboard. There's 1TB of cloud-based storage as well. The whole thing is available for $60 per year.
Our Amazon Echo, a voice-controlled appliance--for want of a better word--arrived on May 17 and we've been using it all week. As Prime members, we paid $100 for ours, but the list price is $200. While some parts are beautifully done, the information services at the back end have a long way to go before the Echo is more than a novelty.
When I bought my iPhone 6 earlier this year, I also purchased a simple, transparent case to protect it; the case cost me $35.
The number and complexity of cyber threats leveled against enterprises of all sizes these days is staggering. There's everything from advanced persistent threats created by well-sponsored nation states to disgruntled <a href="http://www.networkworld.com/article/2692093/security0/data-protection-165097-disgruntled-employees-lash-out.html">insiders</a> looking to make a fast buck or enact revenge for some perceived wrongdoing.
Back in January 2013, BlackBerry gave me its first BlackBerry 10 smartphone, the Z10, for review. It also gave me a "reviewer's kit" composed of a number of accessories: a case, screen cleaner cloth and a "battery charger bundle," among other things.
It's no stretch to say that ads are what make the Web go 'round. The content you're reading right now? Paid for by ads. Google, Facebook, Pandora, YouTube? Driven by ads. This is not a new concept: TV and radio have relied on commercials since their earliest days. Because, let's face it, <em>something</em> has to pay for all the free programming and services.
In the real estate world, the mantra is location, location, location. In the network and server administration world, the mantra is visibility, visibility, visibility. If you don't know what your network and servers are doing at every second of the day, you're flying blind. Sooner or later, you're going to meet with disaster.
Whatever your primary OS, Linux distro Tails 1.0 offers a plethora of security features to help you work online without worrying about privacy issues.
Linux users who want to avoid browser-based Twitter apps can try out these five local clients -- including one that still uses a command-line interface.
You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised.
If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.
Everyone needs a Wi-Fi spectrum analyzer, but there are times when analyzing cellular spectrum is also essential. Fluke Networks' new AirMagnet Spectrum ES provides a broad range of capability at a very attractive price. Spectral analysis, a longstanding fixture in electronics and manufacturing test, and, more recently as a valuable tool for understanding coverage, interference, and other elements of Wi-Fi, is the art and science of extracting meaning and insight from wireless systems at Layer 1 -- radio waves.
Enterprise mobility management (EMM) can encompass a broad range of functions, from managing mobile devices, to applications, expenses, personnel, and policies. But perhaps the most important aspect is mobile information/data/content management, tracking the distribution and usage of sensitive organizational data, as well as ensuring appropriate security and policy compliance.
- South Australia requests ‘urgent’ investigation of mobile black-spot funding
- Telstra taps Juniper exec to be new chief operations officer
- Former Atlassian security chief takes role at Cyber Security Growth Centre
- ‘Cause unknown’: Basslink fault investigation sheds little light on outage
- Security researchers warn government over data re-identification ban
- Apple offers views on automated car policy, but cagey about its plans
- How to shoot a drone out of the sky
- Microsoft's "Holoportation" will virtually beam you into another room
- Russia claims it foiled a cyber attack from a foreign spy service
- Intel's silence on Optane SSDs raises questions about launch and focus
- How iflix used consumer intent data to gain 1 million subscribers in six months
- Mercer's marketing and customer chief promoted to global role
- Twitter gets new product head and team from app startup Yes
- Review of 457 visa scheme raises questions about local versus imported marketing skills
- Telstra CMO calls for shake-up of TV commercial models