Google+: The Missing Manual
If you want to gain more control over your social networking activities with Google+, this jargon-free guide helps you quickly master the ins and outs of the site. Learn how …
Network Security First-Step, 2nd Edition
With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively …
Low Tech Hacking
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that …
Data Privacy Day 2012 is upon us
Coordinated and led by the National Cyber Security Alliance (NCSA), Data Privacy Day on January 28, 2012 will promote the importance of data privacy and encourage digital …
Leading CSOs outline roadmap to combat advanced threats
RSA released new insights from a group of the world’s leading CSOs, designed to help corporations and governments improve visibility into advanced threats ranging from …
The Information Diet
The modern human animal spends upwards of 11 hours out of every 24 in a state of constant consumption. Not eating, but gorging on information ceaselessly spewed from the …
Questioning of incoming data crucial for security awareness
In the last six-to-twelve months, we have witnessed many different cyber attacks. Hacktivists were making a statement, the players behind the so-called Advanced Persistent …
iPhone: The Missing Manual
With the iOS5 software and the new iPhone 4S device, Apple has another world-class hit on its hands. This pocket computer comes with everything—cellphone, iPod, Internet, …
PCI pitfalls for retailers
Businesses that process, transmit or store cardholder data must implement security controls as defined by the latest PCI DSS standard. The following are the nine common PCI …
Top disaster recovery issues
It is no surprise that disaster preparation is top of mind among people these days. The images and stories coming out of Japan following the devastating earthquake and tsunami …
Volume and sophistication of attacks to increase
Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …
Microsoft SharePoint 2010: Deploying Cloud-Based Solutions
Take your Microsoft SharePoint solutions to the cloud and gain scalability and high availability while helping to lower your operational costs. Led by a SharePoint expert, …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader