browse
Traditional Security Is Ineffective in the Cloud - 5/19/2016
Platform : Security
10 Most Important Things to Consider When Purchasing an Antivirus Software - 5/23/2016
Platform : Viruses
Reduce Your Open Source Security Risk: Strategies, Tactics, and Tools - 5/19/2016
Platform : Security
A Guide to Assess Where You Stand With Cloud Security - 5/15/2016
Platform : Cloud Computing
Even your connected car will need antivirus software - 5/2/2016
Platform : Networking
Top 10 Tips for Educating Employees about Cybersecurity - 4/26/2016
Platform : Security
Is It Time to Rethink Cyber-Security Strategies? - 4/21/2016
Platform : Security
Microsoft Cloud App Security Now Generally Available - 4/24/2016
Platform : Cloud Computing
 

Last week's most popular technology story...

Microsoft's Cloud Business Can't Overcome Weak PC, Phone Sales

Microsoft shares were lower in after-hours trading on Thursday, April 21, after the company's third-quarter net income showed a decline of 25% to $4.99 billion. Revenue declined by 6% year-over-year for the quarter to $21.78 billion. Earnings and revenue missed analyst expectations. However, the software giant said growth of its cloud business remained strong, and there was still plenty of potential to grow revenues with the most recent release of the new enterprise version of Office 365, the cloud-based version of the company’s client productivity suite...

Read Article

browse
Business Phone System Buyer's Guide
by: Compare Business Products
Information Technology | Hardware | Telecom
10 Mistakes to Avoid When Buying a Phone System
by: Compare Business Products
Information Technology | Hardware | Telecom
Creating Your Mobile Marketing Strategy
by: Marketo
Businss to Business | Marketing
The Definitive Guide to Digital Advertising
by: Marketo
Businss to Business | Marketing
CRM Solutions for SMBs
by: Compare Business Products
Information Technology | Software | Business | CRM
The Power of A/B Testing
by: Marketo
Businss to Business | Marketing | Digital
 
Top 10s
Microsoft's Cloud Business Can't Overcome Weak PC, Phone Sales- News | Information Week
Microsoft to begin SHA-1 crypto shutoff with Windows 10's summer upgrade- News | CIO Magazine
7 Tenets of Personalization: Don't Compromise Your Website or App Experience- Editorial | Business 2 Community
Standardizing Cloud Computing With OpenStack And Software-Defined Storage- Research | Information Week
The world's first artificially intelligent lawyer gets hired- News | Business Insider
Instagram's analytics will offer audience demographics, post impressions, reach & more- News | Tech Crunch
Data breach trends 2016 - what Verizon's analysis of real breaches reveals- Research | Tech World
Kiss Your Privacy Goodbye! US Supreme Court Gives Blessing for Government to Hack You...- News | BBC
Hackers breach SWIFT financial network- News | Bangkok Post
Google Hires Ex-Motorola Chief To Head New Hardware Division- News | Information Week

browse
How to access the dark web using TOR - HowTo | Privacy
Supersize User Adoption with Tailored Analytics - HowTo | Business Intelligence
How to Protect Your Website From Hackers - HowTo | Hacking
A Guide to Assess Where You Stand With Cloud Security - HowTo | Cloud Computing
4 Ways to Protect Your Companies from the Legal Risks of 3D Printing - HowTo | 3D Printing
New Tools for Old Tricks: How To Use Tech Innovations To Improve Your Team's People Skills - HowTo | Career/Personal Development
What is a chatbot, how do you build one, who is building them and are they good? - HowTo | Online
App Makers: Stop Executing and Start Asking Questions - HowTo | Software Development