• February 25, 2013

    European Data Protection Directive: How will you comply?

    The Information Commissioner’s Office has fined UK public sector bodies more than £2 million over the past 18 months as poor data handling practices have come to light.

    Read More...

  • February 14, 2013

    Wave Outlines Windows 8 Mobile Device Management Alternative

    The built-in security capabilities of Windows 8 devices could simplify matters for IT organizations that are considering bring-your-own-device (BYOD) scenarios.

    Read More...

  • February 13, 2013

    Wave Systems Security Solution for Windows 8 Tablets Eliminates Need for Passwords on Enterprise Systems

    The growing popularity of mobile devices has given many IT managers concerns about security as they develop internal policies to accommodate 'bring your own device' (BYOD) users while protecting enterprise data. Smartphones and other mobile devices operate under different technology platforms, and are no less of a malware target than a desktop PC is.

    Read More...

  • February 13, 2013

    Wave Announces New Windows 8 Tablet Security Offering For Enterprises

    Lee, MA--February 12, 2013 --Wave Systems Corp. (NASDAQ:WAVX), the Trusted Computing Company, is delivering enterprise-grade management and security on the newest generation of tablets running Microsoft's Windows 8 operating system. Wave's security solutions are designed to augment the existing management infrastructure enterprises own today to deliver modern mobility that's simple to use, always connected and always secure.

    Read More...

  • February 13, 2013

    Windows 8 Update

    Dealing with Windows 8 BYOD

    When workers start bringing their own Windows 8 Pro devices to work, it can pose a security and management problem for IT.

    Wave Systems is introducing an upgraded version of its Wave Mobility Solution that deals with the problem and also makes it simpler for mobile end users to sign in to the corporate network.

    Read More...

  • February 12, 2013

    Wave Cuts Passwords From Tablet Authentication

    Wave Systems Corp. is taking the growing crescendo of distrust around password security to heart. Its latest launch is a security app that provides enterprise-grade management and security functions targeted for Windows 8 tablets. The biggest channel selling point? No passwords.

    Read More...

  • February 7, 2013

    Federal Reserve Breach: What Happened?

    The Federal Reserve confirms it's been breached - an attack that experts say signals to banking institutions and their vendors a heightened urgency to implement security best practices, including the encryption of passwords.

    Read More...

  • February 1, 2013

    Delayed Reaction

    In 2008, an unencrypted laptop went missing from the car of a worker at Barnabas Health, New Jersey's largest health care system. And, although fewer than 2,000 records were exposed, the health care provider subsequently made self-encrypting drive (SED), a type of hardware-based encryption, a mandatory part of its mobile device upgrade process.

    Read More...

  • January 25, 2013

    Even 'rogue' clouds can be secured, experts say

    One of the latest challenge for the heads of IT departments is how to secure sensitive company information that employees have shared or stored on public clouds without their knowledge, permission or control. A new survey describes how big of a problem "rogue" cloud use has become.

    Read More...

  • January 25, 2013

    Effects Of Social Media On Job Prospects

    According to the research, a huge 91% of employers use LinkedIn, Twitter and Facebook to screen candidates. A further:

    Read More...

  • January 23, 2013

    Windows 8 brings Security-by-Design to the mainstream

    For some time, layering security software on top of a device has been the approach that thousands of enterprises (and software security providers) have relied on in their quest to protect information and evade network threats. It’s easy to see why – it’s the approach that’s been sold to them.

    Read More...

  • January 21, 2013

    CIOs must scrutinise the security of their cloud setup

    Research from IT recruitment consultancy Robert Half Technology has brought up an all too familiar story – CIOs are not testing the security credentials of their cloud vendor.

    The latest figures suggest that 55% of the CIOs surveyed haven't tested the security procedures that their cloud vendor provides, despite the threat of expensive retrospective action.

    Read More...

  • January 20, 2013

    Scrambls: Encode Communications On Anything With A Box To Type In [Chrome]

    Are you looking for a way to control of your communications on Facebook and forms of social media? Are you looking to take control of who can see your messages?

    Read More...

  • January 9, 2013

    Providing secure collaboration on public social networking sites

    Corporate data doesn't stay on the desktop computer anymore. Employees are using consumer-grade social networking and file-sharing tools for collaboration, and blocking access to these services is no longer an option, thanks to the bring your own device, or BYOD trend.

    Read More...

  • January 3, 2013

    New Developments Emerge About E-Signing The 4506-T

    The deadline is just around the corner. Next week the I.R.S. will begin accepting electronically signed 4506-T forms. PROGRESS in Lending has been extensively covering this story since the news broke a few months ago. Today we have learned about a new development in this groundbreaking move that will once and for all enable all upfront disclosures to be e-signed. Here’s the news:

    Read More...