The Application Usage and Threat Report (June 2014) provides a global view into enterprise application usage and the associated cyber threat landscape. Accomplished by summarizing network traffic assessments conducted across more than 5,500 organizations worldwide between March 2013 and March 2014. This version of the report will analyse the relationship between threats and their application vectors. The most surprising data points being both the diversity of applications displaying threat activity and the high concentration of activity surrounding only a few key techniques.
- Enterprises can now use Dell's Kace appliance to manage Chromebooks
- Will the U.S. be ready with secure chip cards and payment terminals?
- 6 DNS services protect against malware and other unwanted content
- Google Fiber expanding to Atlanta, Charlotte, Nashville and Raleigh-Durham
- Apple iOS 8.1.3 upgrade won't suck up your storage
- FTC calls on IoT vendors to protect privacy
- Microsoft's Surface line-up posts 2nd straight profitable quarter
- How to stay ahead of threats to DNS servers
- PCI DSS 3.0 went into effect Jan. 1. Are you in compliance?
- Apple tops Chinese smartphone market for the first time
- DNS hijacking vulnerability affects D-Link DSL router, possibly other devices
- Mobile World Congress rumor mill churns with reports of better screens, cameras
- Privacy tsar to EC: Wrap up EU-US data exchange talks quickly or else
- Enterprises: Get ready to pay to go slow on Windows 10
- Dropbox buys Pixelapse to add version control for visual designers