Volume and sophistication of attacks to increase
Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …
Microsoft SharePoint 2010: Deploying Cloud-Based Solutions
Take your Microsoft SharePoint solutions to the cloud and gain scalability and high availability while helping to lower your operational costs. Led by a SharePoint expert, …
Easy ways to protect your privacy and data
In spite of one high profile computer security breach after another, many people are still not employing even the most basic safeguards to protect their privacy and their …
The Linux Command Line
Thanks to user-friendly distributions like Ubuntu, more people are running Linux than ever before. But many users stick to the GUI and point and click their way through tasks, …
5 reasons to enforce email monitoring
Managing storage continues to be one of the most significant challenges for email management, but the right tools can change this from a daily headache to an easy win. Email …
CompTIA Network+ N10-005 Authorized Cert Guide
CompTIA Network+ N10-005 Authorized Cert Guide is an exam study guide. Best-selling author and expert instructor Kevin Wallace shares preparation hints and test-taking tips, …
EFF: Don’t use the new AOL Instant Messenger
The Electronic Frontier Foundation advises AOL Instant Messenger users not to switch to the new version of the software because it “introduces important …
The antivirus industry and the grayware problem
Grayware is a general term used often used for spyware, adware, remote access tools, dialers and other applications that cannot be defined strictly as malware, but do affect …
Good device and online safety behavior
With more devices in everyone’s hands after the holidays, children are sure to take their cues from parents and older siblings. Ultimately children will become frequent …
Securing Android for the enterprise
The numbers speak for themselves – Android’s share of the worldwide smartphone market is 52.5 percent, more than double compared to a year ago, according to recent …
Tips to manage top IT trends
ISACA shared recommendations today for managing three of the trends widely cited to dominate the IT landscape in 2012: Big Data, the consumerisation of information technology …
SCADA and PLC vulnerabilities in correctional facilities
Many prisons and jails use SCADA systems with PLCs to open and close doors. Using original and publicly available exploits along with evaluating vulnerabilities in electronic …
Featured news
Resources
Don't miss
- Preventing data leakage in low-node/no-code environments
- Strengthening security posture with comprehensive cybersecurity assessments
- Neosync: Open-source data anonymization, synthetic data orchestration
- Update your OpenWrt router! Security issue made supply chain attack possible
- Microsoft: “Hack” this LLM-powered service and get paid