Exploring Google Chromebook security for the enterprise

The Chromebook is unique among new entrants in the mobile device arena. Mike Cobb breaks down the key Google Chromebook security issues enterprises need to know. <img alt="Exploring Google Chromebook security for the enterprise, Blog, Security, Enterprise, Google, exploring, Chromebook"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post on SearchSecurity:…

read more

Sourcefire debuts anti-malware software FireAMP for enterprise

Sourcefire today announced anti-malware software for Windows-based devices that combines signature- and behavior-based detection methods to identify malicious code trying to invade the enterprise network, tracking it down through cloud-based analysis. The lightweight Windows-based software, called FireAMP, can identify malware and block it, says Alfred Huger, vice president of development…

read more

Linux Systems Administrator – Enterprise Support (1st shift) / Rackspace / San Antonio, TX

Rackspace/San Antonio, TX Job Details Linux Systems Administrator – Enterprise Support (1st shift) – 13888 This details all the information about the job posting. To submit your résumé/CV, click on the 'Submit your Résumé/CV to this Job' button. Show Instructions Job TitleLinux Systems Administrator – Enterprise Support (1st shift) Category…

read more

Linux Systems Administrator – Enterprise (1st shift) / Rackspace / San Antonio, TX

Rackspace/San Antonio, TX Job Details Linux Systems Administrator – Enterprise (1st shift) – 15087 This details all the information about the job posting. To submit your résumé/CV, click on the 'Submit your Résumé/CV to this Job' button. Show Instructions Job TitleLinux Systems Administrator – Enterprise (1st shift) Category Information Technology…

read more

How EDRM can bolster enterprise content management security

Learn about implementing enterprise EDRM and how this technology combo supports enterprise content management security. <img alt="How EDRM can bolster enterprise content management security, Blog, Security, Management, Enterprise, content, EDRM, bolster"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post on SearchSecurity: Network Security Tactics View full post on National Cyber…

read more

How to implement an enterprise threat assessment methodology

Learn how incorporating an assessment of external threats can increase the accuracy and comprehensiveness of risk assessments. <img alt="How to implement an enterprise threat assessment methodology, Blog, threat, Enterprise, methodology, Assessment, implement"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post on SearchSecurity: Threat Monitor View full post on National Cyber…

read more