If your company suffered a data breach, would you know what to do to comply with state, federal and local law? Start-up Co3 Systems is offering a software-as-a-service (SaaS) application to tackle that unhappy task, tracking how a corporate data-loss...
Meetings, conferences and training programs in a 3D virtual world such as Second Life can be more engaging and productive than traditional online sessions and phone calls, and much less expensive than face-to-face meetings requiring travel. But some ...
The business benefits of a cloud computing model have been well stated. You cut costs by switching to more flexible on-demand IT resources that can better handle the ebb and flow technology needs at a company.
A survey of more than 900 IT managers shows that adoption of encryption in their organizations is being driven by two main factors, anxiety about possible cyberattacks and the need to meet the payment-card industry (PCI) data security standards.
The second version of the Payment Card Industry (PCI) Data Security Standard (DSS) is being released this afternoon by the organization PCI Security Standards Council, which sets the network and security requirements for merchants and service provide...
Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to safeguard cardholder data from wireless th...
NEW YORK -- A CISO who spent two years organizing identity and access management for the 15,000 users on his network boiled the whole experience down into a 10-step process he presented at the Security Standard Conference this week.
Government needs to better understand the realities of running profitable businesses -- and quickly -- as it imposes security regulations that can affect the profitability of corporations battling in a competitive environment.
Hardly a week goes by when some organization or another doesn't lose some laptops and face a litany of IT security questions. One that always comes up: Were the systems' disks fully encrypted?
An Italian prosecutor has accused Google of violating Italian and European regulations in the way it handles its e-mail communications, the Corriere della Sera newspaper reported Monday.
Oracle licensing consultant Eliot Arlo Colon still remembers the enormous global publishing company that was "so darn confident" it would breeze through an upcoming software license audit unscathed.
EMC Wednesday announced plans to acquire Configuresoft, a maker of server configuration, change and compliance management software, for an undisclosed sum.
Most Popular Reviews
- 1 HP Stream 11 laptop
- 2 Acer Chromebook 11 (CB3-111)
- 3 Asus Zenbook UX303LN Ultrabook
- 4 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 5 Lenovo Yoga 3 Pro hybrid Ultrabook
Best Deals on GoodGearGuide
Latest News Articles
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy
- Cyberattack on German steel factory causes 'massive damage'
- Blackberry reports falling revenue, but loss shrinks
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.