'Antiquated' view needs to give way to more sophisticated, targeted approach says Young
Cloud identity and access management and other innovations are challenging traditional security
US Congress hears statements from Chinese telecoms firms denying equipment has secret back doors
App publisher Blue Toad claims that it - not FBI agent Christopher K. Stangl - was responsible for Apple user data leak
Cisco CTO believes businesses need more positive use-case examples
LIVE 17th SEPTEMBER: As with all technologies, there is an optimum level of cloud deployment at which the functional, business and financial benefits are all maximised. Most organisations have not yet achieved this level. The reason? Legacy and mission-critical...
'Startling' figures from Imation Corp reveal massive security breaches across all sectors
Bloggers alert authorities to worrying security practices at one of UK's biggest online retailers
Eighty-four per cent of smartphones and 69 per cent of tablets used for business
Blizzard states "no evidence" of credit card or billings thefts as passwords are looted