20 Aprile 2017Sicurezza IDG Contributor Network: Finding and protecting the crown jewels Visibility and security controls for internet-based applications such as social media, file sharing and email have been widely adopted at the perimeter. […]
20 Aprile 2017Sicurezza Don’t get bit by zombie cloud data The internet never forgets, which means data that should have been deleted doesn’t always stay deleted. Call it “zombie data,” and unless […]
18 Aprile 2017Sicurezza Mobile, security tools among education tech favorites In the school district of La Crosse, Vicki Lyons depends on mobile device management software from Jamf to manage the Wisconsin district’s […]
10 Aprile 2017Sicurezza Cisco’s first big developers conference to zero in on IoT, cloud Cisco initially scheduled its inaugural DevNet Create developers’ conference in San Francisco for what turned out to be the same week in […]
24 Marzo 2017Sicurezza How to set up two-factor authentication for your Apple ID and iCloud account If you aren’t using two-factor authentication to protect your Apple ID and iCloud account, you really should do it today. Hackers who […]