IT Buyers

Author user photo

Cloud

Slamming the Door on Security Breaches

In today’s cloud-based, sharing economy, how can organizations provide secure access to corporate applications and network?

Author user photo

Cloud

Slamming the Door on Security Breaches

In today’s cloud-based, sharing economy, how can organizations provide secure access to corporate applications and network?

Author user photo

Cloud

Cybersecurity Bridge Goes Up in San Francisco

High-Tech Bridge’s on-demand Web application security testing service, ImmuniWeb, is unique and compelling. Here’s why VCs should take notice.

Author user photo

Mobile

Indoor Mobile Coverage Solutions for Business

Despite the exponential growth in mobile usage, indoor coverage continues to be a challenge. So what are the options for achieving that last mile of signal coverage inside a building?

Author user photo

Big Data

Is Data Decentralization the New Trend?

Data curation or wrangling certainly can help speed time to insight; but should the data be centralized or decentralized? Here are pros and cons.

Author user photo

Mobile

Best Practices for VoIP Security

Corporate VoIP systems are gaining ground, but with increased adoption come increased attacks and more attractive targets for hackers. Here’s how to protect your company.

More Articles

News You Can Use

View recently published Q3 Cybersecurity Market Report. SandHill sponsors Security Software section.

Click here for news about:

  • Internet of Things Framework introduced
  • EY & Hortonworks form big data relationship; Datapipe & DataStax partnering
  • DigiCert enterprise & IoT security certificates