Quantcast
Channel: Tech Page One » Fahmida Y. Rashid
Browsing all 12 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Compliance 101

Compliance management is a complicated process for IT. While everyone agrees compliance is crucial to protect customer data, there isn’t a single all-encompassing standard that everyone can follow. The...

View Article



Image may be NSFW.
Clik here to view.

Authorized Access: 4 ways to secure your virtualized environment

Perhaps you’ve adopted virtualization to impose some control over your servers and networked devices and to simplify IT management. However, a virtualized environment also comes with distinct security...

View Article

Image may be NSFW.
Clik here to view.

Authorized Access: Playing nice with sensitive data on mobile

Mobile device security in the era of smartphone and tablet ubiquity continues to challenge enterprise IT. Mobile device security requires attention to the hardware itself as well as the data and...

View Article

Image may be NSFW.
Clik here to view.

Authorized Access: 5 things you need to know about cloud security

For many enterprises, the decision to shift applications to the cloud is just the first step in what can be a lengthy process. And it’s also the easiest one. The next steps involve deciding which...

View Article

Image may be NSFW.
Clik here to view.

Authorized Access: 5 fast facts about data protection

For IT administrators, keeping up with security can get overwhelming. Keep up with software patches, secure the endpoint, monitor incoming and outgoing traffic, and the list goes on. Even with all...

View Article


Image may be NSFW.
Clik here to view.

3 ways to achieve DNS security

DNS security is proving increasingly challenging as servers are targeted on a grand scale. The domain name system (DNS) is an essential part of the worldwide networking infrastructure. DNS is basically...

View Article

Image may be NSFW.
Clik here to view.

Authorized Access: 4 mobile security policy best practices

These four tips will help you on your way to creating a workable mobile security policy for employee-owned and corporate-owned devices. IT administrators faced with the influx of mobile devices in the...

View Article

Image may be NSFW.
Clik here to view.

Authorized Access: Top 5 enterprise security threats

Focusing on these five enterprise security threats will help you identify the core areas of data protection. What enterprise security threats are keeping you awake at night? Which industry trends make...

View Article


Image may be NSFW.
Clik here to view.

Authorized Access: A closer look at SDN and security

There are security concerns to consider before you take the SDN plunge. New networking technologies such as software-defined networking (SDN) are gaining traction in the enterprise. What security...

View Article


Image may be NSFW.
Clik here to view.

Analysis: Cloud security improves but there’s plenty of room to grow

Existing cloud security standards aren’t perfect, but they can go long way toward helping you choose the right vendors for your enterprise. No one is quite sure exactly what cloud security entails, and...

View Article

Image may be NSFW.
Clik here to view.

With users like these, who needs hackers?

You may spend all your time worrying about hackers, but what about your company’s own employees? IT security teams spend significant amounts of time worrying about ways attackers can breach the network...

View Article

Image may be NSFW.
Clik here to view.

5 fast facts about network security automation

Five automation tools to improve your network security. Security professionals and IT administrators can reduce the amount of time they spend performing regular maintenance and repetitive tasks by...

View Article
Browsing all 12 articles
Browse latest View live




Latest Images