Stories by Matt Hines

SMB - Herd intelligence benefits IT security

The rise of customized malware is forcing security software vendors to change their tactics quickly and begin using customers' machines as their initial line of threat detection intelligence, according to a new report from Yankee Group.

Unlocking encryption management

Someday, encryption features built into a wide range of IT products -- from operating systems and messaging gateways to hard drives and storage systems -- may work in concert to offer central policy enforcement across different types of network asset...

SMB - Veracode pitches backdoor apps security

Veracode launched a new version of its binary code analysis service on Monday that focuses specifically on helping software engineers find potential backdoor vulnerabilities in their programs.

Google revs up security play

Far from being a major player in IT security today, Google has ambitious designs on becoming a big name in the burgeoning hosted security market, begging the question, Will your organization ever be ready to let the world's largest information retrie...

Malware flood driving new AV

During a weeklong period in mid-November, security experts with Symantec observed roughly 65,000 new applications being downloaded onto the computers of customers participating in a new research project -- based on their analysis of the software, as ...

Cenzic virtualizes Web apps testing

Web applications security testing specialist Cenzic announced the latest version of its flagship scanning platform on Monday, adding new capabilities for inspecting programs utilizing virtualization technologies made by VMWare.

Apps accelerators tackle security

Companies that specialize in helping businesses speed delivery of their applications and Web content are increasingly involving themselves in IT security as the continued proliferation of systems-defense technologies has become a potential roadblock ...

Cost of data breaches keeps rising

Organizations that experience data breaches are paying more than ever to recover from the incidents and retain customers once the events become public knowledge, according to a new research report.

NAC industry at a crossroads

According to Steve Hanna, a distinguished engineer at Juniper Networks and the de facto spokesman for the network access control (NAC) industry, the device authentication technology is failing to deliver on its promise.

Consumers to drive enterprise mobility

Enterprises hoping to maintain tight control over future adoption of mobile technologies should open their minds and embrace the notion that consumer devices will continue to filter their way into the workplace, whether they like it or not, according...

US Federal IT pros insecure over security

If a new poll sponsored by Cisco is to be considered an accurate indicator of the opinions held by a majority of federal IT leaders, it appears that the security of the United States government's network infrastructure remains a serious problem.

Zero day specialists hooked on spear phishing

At the cutting-edge of IT-based crime, attackers are using a combination of easily sourced technologies and social information to carry out successful assaults on the very organizations that spend more time and money on security than anyone in the wo...

Google's Android boosts enterprise mobile Linux

Google's introduction of its Android device operating system and Open Handset Alliance on Monday could help create just the breed of mobile Linux platform that many enterprise IT managers have been waiting for, industry experts contend.

Experts say issue of click fraud not improving

Companies like Google and Yahoo that control major online advertising networks have not met their pledge to aggressively ferret-out click fraud among their affiliate partners, driving growth of the problem across the entire Web industry, according to...

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?