Searched for: "messaging security and availability"
- Security (375)
- Mobility (25)
- Collaboration (17)
- Networking (17)
- Microsoft (12)
- Software (8)
- Enterprise Software (7)
- Cloud (6)
- Developer (6)
- Open Source (6)
- Data Centers (5)
- Hardware (5)
- Banking (4)
- Cxo (4)
- Big Data (3)
- Social Enterprise (3)
- After Hours (2)
- Android (2)
- Apple (2)
- Data Management (2)
- Project Management (2)
- Storage (2)
- Printers (1)
- Smbs (1)
- Virtualization (1)
About 518 results for "messaging security and availability"
A vulnerability first reported in 1997 can be used by attackers to harvest credentials. Although this is even easier to exploit now, a Microsoft rep is downplaying the risk.
JAMF Bushel is a cloud-based MDM platform with some trade offs, but a lot to like depending on your MDM needs.
Soon, it will be possible to send money via the Facebook Messenger app. Here are the details about the plan and why they're doing it.
Learn how the battle over privacy technologies could define the future of the web. This TechRepublic cover story explains the strange history and the serious consequences of the fi...
While the market seeks device security in enterprise mobility management, mobile app-centric security might be the future.
Jesus Vigo examines the CTB-Locker virus, its effects on your data, and how to best protect your computer from this ransomware infection.
Mobile devices have evolved from simple devices, which are used for a phone call and SMS messages to Smartphone devices that can run third party applications. Now-a-days, malicious...
Alex Howard thinks 2015 will be a big year for digital government services and identity in the US. He also profiles the startup ID.me, which will provide identity software for Conn...
Secure Steganography Algorithm Based on Cellular Automata using Fibonacci Representation and Reverse Circle Cipher Application for Steganography
Steganography is the act of hiding a message inside another message in such a way that can only be detected by its intended recipient. The process of hiding information inside anot...
Google adhered to its 90-day policy and disclosed vulnerability details about a bug in Windows the day before Microsoft was scheduled to publish the patch. Which company is right?