by ray | Feb 7, 2015 | Security
Article by Istvan Lam Every other week there is a new high-profile data breach in the media. From Target to Home Depot to iCloud to JPMorgan to Snapchat to the White House—and most recently the devastating attack on Sony Pictures Entertainment—there’s always a...
by ray | Feb 7, 2015 | Security
Article by Jennifer Openshaw This week’s hijacking of several social-media accounts run by U.S. Military Central Command underscores a powerful message: Just because it wasn’t data or computer networks that were attacked doesn’t mean it’s not detrimental to your...
by ray | Feb 7, 2015 | Tech News
Article by Eugene Kim When VMware released its first hybrid cloud service in 2013, the server virtualization company was considered late to the cloud market. Amazon had already launched Amazon Web Services in 2006 and Microsoft released its cloud computing service...
by ray | Feb 7, 2015 | Security
Article by John D. Sutter Maybe you got the email, too? It landed in my inbox at 1:58 a.m. on Thursday. “To Our Members: Safeguarding your personal, financial and medical information is one of our top priorities, and because of that, we have state-of-the-art...
by ray | Feb 6, 2015 | Security, Tech News
You may have worked in the cloud if you’ve ever created and shared a homework document in Google Docs, been on a project team in Basecamp, or used customer relationship management software like Salesforce. Or maybe you regularly dump your photos into Flickr,...