Logan G. Harbaugh is a longtime technology journalist with experience reviewing a wide range of IT products. Every week, there are new reports of data breaches at organizations of every type.
Check Point Software Technologies responded to the mobility trend by offering three secure communications products. For starters, Check Point has its IPSec VPN Software Blade for remote access. Scott ...
Jason covers desktop applications and help desk utilities, including reviews geared toward the IT end-user support function. Jason is the PC infrastructure manager for Harcros Chemicals, a worldwide ...
Karen Schwartz is a freelance technology writer based in the Washington D.C. area. With more than 300,000 students and 356 school sites, Nevada’s Clark County School District is one of the largest in ...
General Data Protection Regulation (GDPR) together with the growing number of data breaches are the most pressing reasons why small and medium businesses are implementing data protection technologies ...
Bottom Line: Attacking endpoints with AI, bots, and machine learning is gaining momentum with cybercriminals today with no signs of slowing down into 2020, making endpoint security a must-have ...
Trend Micro has released security updates to address multiple critical-severity remote code execution and authentication bypass vulnerabilities that impact its Apex Central and Endpoint Encryption ...
Pointsec Mobile Technologies last week released software designed to restrict or block data transfers over various ports on a mobile device. The new release of Pointsec Device Protector adds optional ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results