ITProPortal spoke to Lori Williams, general manager of European operations for Appirio, about what a social intranet is, and how it can help your business save time, money and effort.
eBay seller buydig has slashed the price on this fully waterproof Sony Cyber-Shot DSC-TX30 18MP 5X Optical Zoom digital camera. It's now going for a low £101, with free shipping included.
With football fans from around the world heading to Brazil for the World Cup 2014, security concerns are no surprise. If you're heading to Brazil for the football, make sure to download these apps.
We round up the three biggest threats you need to be aware of this week, including a nasty new breed of Android malware, the FBI's two-week warning on cryptolocker, and a mysterious hacking group.
A site called shrturl.com has been allowing users to fake news stories with amazing credibility. One, on a hoax acquisition of Silicon Valley startup accelerator for $266 billion is doing the rounds.
Berlin-based Julian Oliver has released a simple program that he calls Glasshole.sh, designed to detect any Glass device attempting to connect to a Wi-Fi network and block its access.
ITProPortal headed to Skolkovo, outside Moscow, to take a look at how the Kremlin's controversial "startup village" fosters entrepreneurship among tech startups. Could Russia recreate Silicon Valley?
The UK’s National Cyber Crime Unit put out a perplexing piece of advice: users now have two weeks to protect themselves from the Gameover Zeus and Cryptolocker malware. So what can you do?
We round up the three biggest threats you need to be aware of this week, including the dastardly Iranian hackers using Facebook to snare victims, and how to unlock your iPad if it gets ransom-locked.
An Iranian hacker group targeted over 2,000 US military personnel, journalists and lawmakers over 3 years by creating over a dozen fake social media profiles and even creating a fake news website.
LG has just released its flagship LG G3 smartphone, in a worldwide launch event that looks to be one of the biggest of the year. But how does it compare to Sony's impressively high-end Xperia Z2?
LG is just few hours away from finally launching its much-awaited LG G3 smartphone, and ITProPortal will be on hand with minute-by-minute coverage of the whole event.
The former "leader" of notorious hacking group LulzSec has helped the FBI stop more than 300 cyber attacks since his arrest for hacking in 2011.
A number of iPhone and iPad users have fallen foul of a particularly nasty hack, in which they find themselves locked out of their devices unless they pay to have them unlocked.
Garry Sidaway of NTTCom tells us why despite all the headlines about advanced persistent threats and data breaches, hardly any companies have an instant response plan.
In this video, Christopher Strand of Bit9 tells us about advanced endpoint protection, as well as what a company needs to do the moment it thinks it might have suffered a data breach.
Don't be caught out! A new Trojan has been spreading through Twitter, claiming to link to an article about the US Government cracking down on bitcoin.
Darren Gross from Centrify tells us why the secret to business security is having one, unified identity, and what you can do to stay ahead of regulatory requirements.
Willy Leitcher of Cyphercloud tells us what the advantages are of moving to the cloud, and how it can give businesses the flexibility to scale and grow, if you take care of the security concerns.
In this video, Sol Cates of Vormetric tells us what the biggest threat is to an organisation's data, and what three types of users are accessing your data.
Charles Sweeney of Bloxx tells us why the internal threat could be the greatest factor going into the future, and why anonymous proxies could be the most dangerous force for internal threats.
In this video, Peter Wood of ISACA lets us know how people with a more general IT background can move into a more lucrative and rewarding career in cyber security.
Trey Ford of Rapid7 lets us in on why attackers are increasingly targeting the human element of the business, and how businesses can defend themselves against that kind of threat.
Sarb Sembhi of ISACA lets us in on the classic career paths for cyber security experts. He tells us the one thing that security gurus have in common, and what certifications you need.