Most enterprises now use two or more cloud service providers, and 35% use up to five monitoring tools to keep tabs on hybrid cloud and multi-cloud environments. What’s the best approach to full network visibility?
Stories by Stacy Collett
Attacks that proved successful on PCs are now being tested on unwitting mobile device users to see what works -- and with the number of mobile devices with poor protection soaring, there are plenty of easy targets. "Attackers are definitely searching after the weakest point in the chain," and then honing in on the most successful scams, says Lior Kohavi, CTO at CYREN, a cloud-based security solutions provider in McLean, Va.
What do smartphones and corporate credit cards have in common? Very soon, both will be monitored by employers in an effort to detect abnormal or otherwise suspicious patterns of activity. In the age of bring-your-own-device (BYOD) policies, companies are turning to techniques like these to manage access from smartphones and tablets to their internal systems and to confirm the identities of the people using them.
There's little doubt that Google Inc. is indeed king of online media. In August 2007 alone, Google captured 57% of worldwide market share among search engines, with more than 37 billion search inquiries, according to analyst firm comScore Inc. in Reston, Va. Add to that a mind-boggling stock price of US$711 per share on Nov. 5. Not surprisingly, this dominance has led to endless rumors about where Google is headed next.
Microsoft Learn represents a new hands-on approach to learning that aims to help all stakeholders achieve their goals faster