123ArticleOnline Logo
Welcome to 123ArticleOnline.com


Here's the recent articles submitted by skyhigh networks

Articles By skyhigh networks

Page: << <    1  2  3 [4]  5    > >>


In Wake Of Target Breach, Firms Focus On Cloud Security    Submitted as: skyhighnetworks
After a massive breach involving millions of customer credit cards, Target and the government are investigating what went wrong.(read entire article)
View : 109 Times
Category : Computer Programming

It Opportunities Surrounding Shadow It   By: skyhigh networks
Trends are not going away. In fact, they are expanding broadly, fueled by the growing consensus that use of cloud services results in higher productivity. A recent survey of IT decision makers found that 72% suspected that Shadow IT was beneficial and made it easier for employees to do their jobs. However, Shadow IT also creates clear data security and compliance risks.(read entire article)
View : 112 Times
Category : Computers

Leveraging Data Loss Prevention Software To Prevent Data Leaks    Submitted as: AdamChriss
Blue Shield of California recently mistakenly placed clients' social security numbers at risk. Approximately 18,000 are being notified about how their SSIDs were publicly released.(read entire article)
View : 83 Times
Category : Computers

Mobile Security Market Grows To $4.5b    Submitted as: Skyhighnetworks
As more consumers shift their attention and time to applications on mobile devices and tablets from traditional desktop and laptop computers, the market for Mobile Security solutions is expected to reach $4.5 Billion according to Claritus, a industry research firm based in London.(read entire article)
View : 81 Times
Category : Computers

Protecting Your Company From Backdoor Attacks – What You Need To Know   By: skyhigh networks
A rare example of a backdoor planted in a core industry security standard has recently come to light. It is now widely believed that the NSA compromised trust in NIST's encryption standard (called the Dual EC DRBG standard) by adding the ability for NSA to decipher any encrypted communication over the Internet.(read entire article)
View : 100 Times
Category : Computers

Saas Security Final Piece Before Adoption Spreads    Submitted as: Skyhighnetworks
According to industry research from IDG, the companies want to adopt new cloud technology but are waiting until SaaS Security is more developed.(read entire article)
View : 80 Times
Category : Computers

Saas Security Highlighted In New Report    Submitted as: Skyhighnetworks
A recent report on SaaS Security highlighted a number of developments including that the average company in Europe is using 588 cloud services, almost as many as US companies which average 626 services.(read entire article)
View : 114 Times
Category : Computers

Shadow It Also Brings Shadow Costs    Submitted as: skyhighnetworks
When Susan Emsley, a nurse at Stanford Hospital, uploaded patient records to Dropbox, she felt like she was improving quality of care.(read entire article)
View : 92 Times
Category : Computer Programming

Shadow It Not Limited To Rogue Employees    Submitted as: skyhighnetworks
Cloud apps are widely used in the workplace, whether approved by IT or not, according to a new report by cloud security vendor Skyhigh Networks which shows the average company uses a whopping 626 cloud services.(read entire article)
View : 82 Times
Category : Computer Programming

Shadow It: A Growing Problem    Submitted as: skyhighnetworks
Shadow IT is apps that employees and even whole departments buy and use without the knowledge or approval of the IT department.(read entire article)
View : 136 Times
Category : Computers

See As RSS
Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address:
Google