SMEs are increasingly dominating the market for security applications. New threats and BYOD let companies invest in their security. The turnover in the market for security software is therefore grown last year by about eight percent. Gartner reported the turnover of the global market for security software grew last year by 7.9 percent to $19.2…

Cloud computing has become another key resource for IT deployments, but there is still fear of securing applications and data in the cloud. These concerns include authentication, authorization, accounting (AAA) services; encryption; storage; security breaches; regulatory compliance; location of data and users; and other risks associated with isolating sensitive corporate data. Add to this array…

Security and compliance concerns are still major stumbling blocks to cloud adoption. According to a study by security firm Lieberman Software, nearly 48% of members of teams in business fear of government and legal interference before putting sensitive data in the cloud. This is a survey to close more than 300 IT professionals who revealed…

Around the world, Internet users are beginning to tire of giving their personal data on the Internet and the big data information collected and monetized is headed for a clash with privacy concerns. According to tech analyst firm Ovum, netizens around the world begin to realize the amount of personal data collected. The survey conducted…

A global survey has shown that it is very common that companies of all sizes suffer damage due to the use of public cloud applications that are not managed or integrated within the company’s IT infrastructure. Symantec has released the results of a survey conducted by ReRez in the months of September and October 2012…

Cloud computing technology is one of the most transformative technologies in recent history, as it allows computers to perform tasks that are normally beyond their computing and storage capabilities. We have also seen that the amount of web applications available has increased rapidly as the consumer market starts to accept cloud computing. Everything from document…

IBM announced a wide range of security software solutions to help organizations protect their information and identities within and outside the company in massive data environments such as Big Data, mobile and cloud computing. Specifically, IBM presented ten products and improvements for organizations to deal with new security threats and challenges arising as a result…

Phishing is a popular scam to bait internet users into providing private information. It usually acquires information for the purpose of identity theft. A “phisher” usually sends emails to various individuals and claims to be a legitimate entity. People are duped into providing their personal information, mostly of financial nature, because they believe that the…

TechSoup in partnership with TechSoup Global Network conducted its 2012 Global Cloud Computing Survey among 10,500 nonprofits, charities, and non-governmental organizations (NGOs) from 88 countries on the use of technology hosted in the cloud at nonprofit organizations. The objective of the survey was to determine the current state of the technological equipment of these organizations…

The Ponemon Institute published a study on the global use of encryption of sensitive data by users in the cloud. Beyond the results, the document also provides an interesting perspective on the perception of cloud and security by companies from different countries. The study conducted by Ponemon Institute in association with computer security specialist Thales…