If your company suffered a data breach, would you know what to do to comply with state, federal and local law? Start-up Co3 Systems is offering a software-as-a-service (SaaS) application to tackle that unhappy task, tracking how a corporate data-loss...
Meetings, conferences and training programs in a 3D virtual world such as Second Life can be more engaging and productive than traditional online sessions and phone calls, and much less expensive than face-to-face meetings requiring travel. But some ...
The business benefits of a cloud computing model have been well stated. You cut costs by switching to more flexible on-demand IT resources that can better handle the ebb and flow technology needs at a company.
A survey of more than 900 IT managers shows that adoption of encryption in their organizations is being driven by two main factors, anxiety about possible cyberattacks and the need to meet the payment-card industry (PCI) data security standards.
The second version of the Payment Card Industry (PCI) Data Security Standard (DSS) is being released this afternoon by the organization PCI Security Standards Council, which sets the network and security requirements for merchants and service provide...
Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to safeguard cardholder data from wireless th...
NEW YORK -- A CISO who spent two years organizing identity and access management for the 15,000 users on his network boiled the whole experience down into a 10-step process he presented at the Security Standard Conference this week.
Government needs to better understand the realities of running profitable businesses -- and quickly -- as it imposes security regulations that can affect the profitability of corporations battling in a competitive environment.
Hardly a week goes by when some organization or another doesn't lose some laptops and face a litany of IT security questions. One that always comes up: Were the systems' disks fully encrypted?
An Italian prosecutor has accused Google of violating Italian and European regulations in the way it handles its e-mail communications, the Corriere della Sera newspaper reported Monday.
Oracle licensing consultant Eliot Arlo Colon still remembers the enormous global publishing company that was "so darn confident" it would breeze through an upcoming software license audit unscathed.
EMC Wednesday announced plans to acquire Configuresoft, a maker of server configuration, change and compliance management software, for an undisclosed sum.
Latest News Articles
- In a hyper-social world, some seek a little privacy
- Facebook app gives free Internet to mobile users in Zambia
- Sony profit leaps on PlayStation 4 strength
- China's Xiaomi rises to fifth place in smartphone rankings
- No patch yet for zero day in Symantec Endpoint Protection software driver
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How to play DVD movies on your Nintendo Wii
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- 23% off $2599.95
- $78.55 free shipping
- 90% off $2.98
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »