Rethinking Current Endpoint Security Strategies (Part 2) Successful endpoint security strategies must address numerous requirements – from staff and policy to the right technology mix and integration. The first webcast in this series outlined the requirements. This webcast will dive deeper into new approaches and technologies to prevent, detect and respond to threats and how […]

Let’s imagine you traveled back in time, smartphone in pocket. Let’s say a medieval peasant sees you using this strange device. Naturally, they’d be curious. Would you be able to explain how it works? Most people wouldn’t, for a reason—smartphones are designed to be easy to use. And this can create a problem: tech-savvy criminals […]

Virtualization is no longer just a buzzword for large IT enterprises—it’s become a top priority across most business sectors. If you’re curious to see it work in action, look to the success of this large warehouse-style retailer. Through McAfee Solutions, the enterprise successfully virtualized 98 percent of its IT infrastructure, an impressive number for any […]

Por Jamie Tischart Publicado inicialmente en CSO Online Gartner informa que a finales de este año, el 60% de las compañías globales habrán almacenado datos confidenciales de clientes en la nube pública, un incremento del 40% en tan sólo dos años. Además, nuestra encuesta de Estado de Adopción de la Nube reveló que más de […]

A few years ago, Optimizely decided to try something different for the 2013 Dreamforce event, a developer and user mega-conference hosted by Salesforce in San Francisco. Instead of spending the hefty $20,000 to set up a booth at the conference, they decided to spend $7,000 to launch a 20-foot illuminated blimp into the night sky […]