Security

Recent Articles

  • Google Apps FISMA Certified Amid IT Security Concerns

    Google revealed today that it will answer security critics and build out its government customer base with a new version of Google Apps, specifically for the government sector, complete with FISMA certification. Google said in its Official Enterprise Blog that Google Apps for Government is the industry’s "first suite of cloud computing applications to receive…

  • Businesses Eager to Join the Cloud, Survey Finds

    "The flexibility of cloud computing could help organizations recover from the current global economic downturn, according to 68 percent of IT and businesses decision makers who participated in an annual study commissioned by Savvis," the cloud infrastructure and hosted IT solutions specialist announced July 21. Research company Vanson Bourne "surveyed more than 600 IT and…

  • Google Apps Gets User Policy Management Controls

    Following an announcement July 13 regarding the addition of mobile device management options for Google Mobile Apps administrators, including a requirement for devices to use data encryption, search giant Google introduced what it said is "one of the most highly requested features from administrators: user policy management." This means "administrators can segment their users into…

  • Google Mobile Apps Get Security Controls

    Ubiquitous search giant Google announced the addition of mobile device management options for Google Apps administrators, including a requirement for devices to use data encryption, the ability to disable the phone’s camera and requiring passwords to be changed after a specified time interval. Currently available to all Google Apps Premier and Education customers, the admin…

  • German Officials Take Aim at Facebook over Privacy Violations

    Don’t mess with the privacy of German citizens, is the message from the head of the Hamburg office for data protection. State official Johannes Caspar has reportedly initiated legal proceedings against the social networking behemoth Facebook, claiming the company illegally obtained data from German citizens not affiliated with the site, which boasts more than 500…

  • Database Vulnerabilities Top 10 Rules IT Shops Break

    Database Vulnerabilities Top 10 Rules IT Shops Break 1. Default, Blank and Weak Username/PasswordsThe same organizations that wouldn’t think of ever leaving their router log-ins at their factory settings very frequently allow hundreds of databases to stand with default username-password combos. No Title 2. SQL InjectionsDBAs and developers must work in tandem to ensure that…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.