Data security used to be primarily about physically controlling where information was stored. But over the last few years the move towards greater use of mobile devices and increasing reliance on email for business communication has made securing information much more of a challenge.
The solution many organizations have turned to is encryption, particularly for emails, but is this the answer? Cloud collaboration specialist Open-Xchange is launching OX Guard, a fully integrated email security and encryption add-on to its OX App Suite.
Following on from Edward Snowden's revelations about the NSA's activity there have been increasing concerns about just how secure our data is, particularly if it's stored in the cloud. Indeed it's reckoned that the cloud industry faces losing billions of dollars in revenue to privacy concerns.
Yet some experts believe that storing data in the cloud is still safer than keeping it in-house. We spoke to Orlando Scott-Cowley, evangelist, strategist and technologist of email management specialist Mimecast to find out why.
As businesses face new challenges from employees use of public cloud services along with demands to allow BYOD use, they're increasingly looking for ways to monitor and control the activity of staff on the web.
We spoke to Brian Azzopardi, founder and CEO of web filtering specialist Rawstream about how enterprises can meet these new demands and why existing products aren’t always up to the task.
Coast, from Norwegian developer Opera, is a browser designed specifically for iPhones and iPads. Unlike other browsers it’s been built for simplicity. Instead of buttons, the app uses swipes for navigation. Gestures have replaced the typical functions. Despite this ease, Coast offers most of the features you could want, including a powerful, intuitive search and address bar that suggests keywords and site thumbnails as you type.
I spoke to Coast's creator, Huib Kleinhout, about the browser and his plans for the future.
Windows XP support officially ended on last month, yet it is estimated around 30 percent of businesses are still yet to migrate to a new operating system.
Sumir Karayi, CEO of IT efficiency company 1E, explains why 'Zero-Touch Migration' offers the best approach for those businesses that need a rapid route to moving away from Windows XP to minimize the impact on security, desktop performance and the user experience.
Removing the traditional Start button and menu from Windows 8 was a bold move for Microsoft. Unfortunately the tech giant underestimated just how attached to it users were. Rather than embracing the (slightly clumsy) full screen Modern UI, vast numbers of early adopters simply opted to install one of the many Start menus made available by third-party developers.
While most of these programs are straight copies of the Windows 7 Start menu, ReviverSoft has chosen to go down a different route with its product. Start Menu Reviver is a Modern-UI styled touchscreen-friendly Start menu that’s been designed to look as if it’s part of Microsoft’s OS. The recently released Start Menu Reviver 2 improves on the first edition by offering a sleeker design, greater customization, and a Windows 7 mode. I spoke to Davide De Vellis, co-founder of ReviverSoft, about Start Menu Reviver and what he thinks about Microsoft’s plans to introduce a Start menu of its own in a future Windows 8.x.update.
Did you know the average person spends 23 full days a year using their mobile phone? That is around ninety minutes every day. Smartphones have become lifelines for many. What if you were to drop your phone in a toilet and lose everything on it? This nightmare will occur for nearly 100,000 cell phone users in the US every day who will damage their phone just by dropping it in water.
An American inventor has created a cost effective solution. DryBox Rescue is a machine designed to completely dry your phone of all moisture in 30 minutes even 2-3 days after getting it wet. I spoke to David Naumann, Partner/Managing Partner at DryBox to find out more about how it works, and what’s next for the company.
The recent Heartbleed bug, in addition to a general rise in cybercrime activity, has led to companies scrambling to re-evaluate their online security. But how can organizations ensure that have a consistent and reliable approach to protecting themselves?
We spoke to Tanya Bragin the principal product manager at ExtraHop Networks, a global leader in real-time wire data analytics for IT operational intelligence, to find out.
Education is undergoing significant transformations, due in no small part to technology. Video chats give students and teachers the opportunity to interact without even being together in the same room, software makes teaching and learning more effective, reading books can be done without turning even a single page and, for an increasing number of students, jotting down notes has shifted from pen and paper to PCs.
It should not surprise anyone that, in this day and age, eager students can learn new, relevant skills and land good paying jobs through alternative learning programs that require much less of their time to graduate and are more affordable, compared to traditional education. RefactorU is one of the companies which offer alternative learning programs that "challenge" people to reinvent themselves, giving them the chance to learn how to code, manage projects or how to build and fly drones. I chatted with RefactorU CEO Sean Daken to learn more about what it offers, the entailed cost and more.
In recent years the threats faced by both individuals and businesses have changed thanks to the adoption of new technologies like the cloud, a shift towards social engineering attacks, BYOD and more.
We spoke to Egemen Tas, vice president of engineering for leading certificate authority and security software provider Comodo to get his view on current threats.
Allowing employees to use their own mobile devices for work has led to a number of new challenges, particularly when it comes to keeping devices and data secure.
We talked to PJ Gupta, CEO of mobile security specialist Amtel about the risks BYOD presents to enterprises and what they can do to ensure they remain safe.
It's sometimes said that big data is like teenage sex, everyone talks about it but few are actually doing it. To which you could add that those who are doing it aren't really sure if they’re getting it right.
In an effort to find out how big data is being used in the real world, we spoke to the heads of three startup companies which are employing it in unique ways to pursue specific business opportunities.
Wearables make up for an exciting market which offers huge opportunities for innovation and turning otherwise bland devices into modern gadgets. We have smartwatches which augment smartphones, activity trackers which monitor our sleeping habits and physical activity, and glasses which let us take photos and receive navigation directions at the blink of an eye.
Part of the wearable wave are also electronic muscle stimulators, like SmartMio. It works like a traditional EMS, but instead of controlling it manually through physical toggles and buttons, users have a much more powerful mobile app at their disposal. I chatted with the CEO of the company behind SmartMio, Alex Pisarev, to learn more about its wearable strategy and future plans, how the device works and what benefits users have.
Any Internet related provider, whether it be a Telecom Carrier, Internet, Multi-Service or Cloud Provider (ISP/MSP/CSP) or Hosting/Co-Lo Provider are unwilling accomplices to DDoS attacks and other cyber threats that transit, terminate or originate on their networks. Service providers and their customers are inseparably linked by the challenges DDoS attacks present.
As attacks have grown in size, frequency and sophistication in recent years the demands to ensure service availability and service security from customers have risen in unison. Corero has responded to this challenge with the launch of the SmartWall Threat Defense System (TDS). I spoke to Ashley Stephenson, CEO, Corero Network Security, about the new product.
In June 2013, Edward Snowden was revealed as the whistleblower behind the NSA surveillance revelations, shortly turning the man into one of the most controversial public figures of 2013. The documents he stole while working as an NSA contractor and later leaked to the press have exposed a significant number of questionable practices employed by the US agency and its UK counterpart, GCHQ, to collect information and spy on people worldwide with debatable results.
Undoubtedly, many people have questions that they would like to ask Snowden about the outcome of his actions, his personal life or trips to certain countries. If you are part of that group, you can join the Q&A hosted by freesnowden.is, "the support site [...] run by The Courage Foundation and [...] the only endorsed Snowden Defence Fund". Edward Snowen will answer your questions on Thursday, starting at 3 pm EST (8 pm GMT).