Performance tuning Windows Server 2012
Microsoft released a comprehensive paper that describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the …
Burning enterprise authentication issues
Threats keep evolving and are becoming more invasive, targets now go beyond the financial industry and involve any company that has sensitive information – whether its …
Application recovery challenges and how to address them
In response to such trends as growth of mission-critical data, the proliferation of virtualization and cloud within the data center, and the erosion of organizational …
Modern day pirates
Many of you will remember long summer days with the streets filled with laughing children congregating to play football or just hang out with their friends – I certainly …
Overcoming the hacker hurdle during the Olympics
During the Beijing Olympics it’s reported there were upwards of 12 million “cyber security incidents” per day . Hacking has evolved tremendously since …
Five steps for a secure cloud transition
Almost every type of SMB is examining its current IT infrastructure, determining what data and processes can move to the cloud. Of course, security remains one of the biggest …
The dangers of Java and what to do about it
Since late 2010, Java exploits have become way more popular with hackers than the Adobe-related ones. The problem with Java is not so much in the newly discovered …
One in ten SMEs have suffered a data hack
One in ten small businesses in the UK have experienced a data hack. Hiscox research also revealed that 90% don’t have a cyber crime insurance policy in place to protect …
Software security guidance for Agile practitioners
SAFECode released a paper that provides practical software security guidance to Agile practitioners in the form of security-focused stories and security tasks they can easily …
IPv6 and click fraud
The good news: To accommodate the ever-increasing demand for IP Addresses around the world, every network will eventually transition to IPv6 from IPv4. The bad news: Spammers …
How to make smart grids
A smart grid is an upgraded electricity network with two-way digital communication between supplier and consumer. The adoption of smart grids will change the distribution and …
Top skills for IT asset management leaders
The evolving and growing role of IT asset management (ITAM) is driving both increased demand for existing skills and a new requirement for augmented financial, commercial and …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025