Voce Clients In the News

By Voce Communications | Voce is a public relations powerhouse, consistently achieving greater-than expected results for our clients. This is a sampling of the coverage we secure on a daily basis for the companies we work with.

Holding the HMI Hostage—The Growing Threat of Ransomware

Most of the headlines concerning cyber attacks on Industrial Control Systems (ICS), tend to focus on one of three types of threat actor: …

SanDisk X400 SSD Review (512GB)

KeywordPhrase: SanDisk X400 SSD Review (512GB)Targeted towards read-intensive workloads, boot, and logging applications in both servers and mobile …

SanDisk

SanDisk Connect Wireless Stick allows you to access data on the flash drive wirelessly

It looks like any other thumb drive, but offers way more.<p>The SanDisk Connect Wireless Stick is a flash drive with wireless connectivity and inbuilt …

Application security in the age BYOD, IoT: Time for a rethink

Despite the fact that vulnerabilities still exist in applications, there are few similarities between application security today and 20 years ago. …

4 big plans to fix internet security

The Internet is all-encompassing. Between mobile devices and work computers, we live our lives on it -- but our online existence has been tragically …

Information Security

Where to cut corners when the security budget gets tight

Whenever creating a budget, there is always the rainy day fund or the contingency account in case of unexpected circumstances. But what if those …

Data Breach

Tech Layoffs Doubled in First Four Months of Year

Layoffs in the tech sector more than doubled in the first four months of the year compared with the same period a year ago, according to filings …

Mobility in the Enterprise: Past, Present and Future

1 of 9<p>From the beginning, mobile devices in the workplace have demanded management by IT and will continue to do so far into the IoT future.<p>2 of …

Windows Mobile

10 tips to help CIOs reduce stress

The role of CIO can be a stressful one, and living under stress is something everyone should avoid. That's because overexposure to cortisol and other …

We Machete'd SanDisk's Extreme 510 SSD

Political statements largely behind DDoS attacks

Countries around the world from Estonian and Ukraine to China, Russia, and the US have been the target of DDoS attacks, many of which are politically …

Cybersecurity

The new normal: 4 job changes by the time you're 32

Just about everyone is doing it, at least everyone under 32.<p>That "it" is job hopping. A new study by networking site LinkedIn found that young people really do change jobs a lot more than their parents did.<p>The new normal is for Millennials to jump jobs four times in their first decade out of …

Employment

Why it’s time to learn COBOL

"When I was in college 30 years ago COBOL was declared dead, but it's still going strong and it's still a very good language."<p>So says Leon Kappelman, …

Mobile

Apple vs. FBI: Comply!

The battle of privacy vs. security is incendiary. U.S. nationals who are security professionals are torn on the Apple v. FBI situation. On one hand, …

Cybersecurity Firm Armor Appoints Diana Massaro as CMO

Diana Massaro is the CMO of Armor.Diana Massaro has taken the chief marketing position at Armor, aiming to effectively communicate the market …

Dallas

SanDisk Extreme 900 Portable SSD review

An extremely fast, versatile drive<p><b>The Good</b> The SanDisk Extreme 900 Portable SSD is super fast, and includes both a USB-C cable and a regular USB cable, so it'll work with all USB ports for the foreseeable future.<p><b>The Bad</b> The drive is large and slightly more expensive compared to competing drives. …

Laptops

Workday's Phil Wilmington: Cloud vendors' customer win claims murky | ZDNet

Cloud companies are touting customer wins as if they're zero sum. The enterprise cloud reality looks more like a team sport. Workday co-president …

Cybersecurity Education: An Interview Roger Connolly of Palo Alto Networks

An educated public is in a better position to ask questions about which security products their companies use and how well these protect the integrity of their data. Many users increasingly demand network security that gives them more flexibility using social media and other high traffic sites.<p>For …

Cybersecurity

Apple vs. FBI: Too much to ask

The FBI has effectively asked Apple to create a backdoor for its phones. It has not asked for the data itself, but for Apple to create this tool that …

Defense in depth: Stop spending, start consolidating

When it comes to layered defense and security tools, less is often more just as more can sometimes be less. The average enterprise uses 75 security …

Security

Testers: An Integral Part of the DevOps Team

Building innovative software faster and better is imperative to an organization’s success, so it makes sense to take advantage of DevOps. But what …

DevOps

Trojan Exploits Apple DRM Flaw, Plants Malware On Non-Jailbroken iOS Devices

New malware called AceDeceiver targets iOS devices in China and enables man-in-the-middle attacks that enable hackers to silently drop apps on …

Information Security

Six Things to Know About Computer Theft

One of the most vulnerable links in your security infrastructure is an unattended parking space. Data potentially compromised through vehicle …

Identity Theft

Is Social Media The New 800 Number

Last week a number of large financial service firms, along with Hearsay Social, LinkedIn and Twitter, shared insights around online marketing at the …

Small providers likely to be hack targets

• All recent and archived articles<br>• Conference offers and updates<br>• A full menu of enewsletter options<br>• Web seminars, white papers, ebooks

The 10 Essential Mobile Apps Every Entrepreneur Should Use

An organized entrepreneur is a successful entrepreneur.<p>Below you will find short reviews of 10 mobile apps every entrepreneur should use. These apps will help organize your business no matter the trade. An organized entrepreneur is a successful entrepreneur. Because these apps all offer different …

Small Business

Workday and the Rapid Adoption of Enterprise Cloud – Intel® Chip Chat episode 442 by Intel Chip Chat - Listen to music

Fujitsu Expands Document Management Software Portfolio

PaperStream Server can integrate with existing document capture or ECM applications with no mapping required to connect to an organization’s back-end …

Enterprise Tech