xxxxxxxxxxxxxxxx

Credant protects and encrypts user and corporate data — from PC to mobile to cloud — and works with enterprises’ existing systems management...

Microsoft’s enterprise units, which focus on software for corporations, had … In addition to mobile devices, another potential area of growth...

It makes development across multiple platforms more efficient. “Developers of software for the World Wide Web say the new HTML5 standard is revolutionizing...

… with adding health information exchange (HIE) connectivity to their practices. … and support advanced analytics and business intelligence...

Data exchange can be jumpstarted and build momentum through use of lightweight, … HIE organizations that provide business intelligence and data analytics...

Spotted in early December by two San Francisco-based security firms, Cloudmark and Lookout Mobile Security, the botnet grows when users unwittingly install...

Dell has made a deal to acquire data-protection vendor Credant Technologies and plans to add the company’s technology to its enterprise IT security...

The iframes he observed attempted to exploit at least four previously patched security bugs in Microsoft Internet Explorer, Adobe Reader, and Oracle’s...

… week’s Gartner Security and Risk Summit outside Washington DC, in what amounted to a fireside chat with Gartner analysts about Dell’s...

The need for improvements to Java security is not a new topic in the IT security world. Multiple studies have identified Java as being the least secure...