Expert analysis
Top 10 Ajax Security Holes and Driving Factors
One of the central ingredients of Web 2.0 applications is Ajax encompassed by JavaScripts. This phase of evolution has transformed the Web into a superplatform. Not …
WAN Acceleration: Best Practices for Preserving Security
The centralization of branch office servers and storage enables enterprises to more effectively manage and secure critical business information. By moving servers out of …
Super Power Password Protection – Watching You Watching Me
Not a day goes by without some story hitting the wires about yet another piece of confidential information appearing in somebody’s inbox. Confidential emails, files, …
Data Storage Security – Quo Vadis
Today, industry trends are forcing security in the data center to be re-thought. In particular, the trend towards consolidation results in increasingly centralised data …
Computers, Networks and Theft
Computers have become an integral part of our lives. Every day more and more users and organizations use them to store data which is a type of property. Although most people …
Interview with Marc Vaillant, CEO of Criston
Since the start of his career, Marc Vaillant has always worked in the high-tech sector, holding positions in companies of various sizes. Before joining Criston, he was Chief …
Data Protection Management: Shedding Light on Complex Infrastructures
Data protection strategies have become significantly more complex in recent years. Companies that used to rely on a single-vendor tape backup solution are now using disk-based …
Top 10 Web 2.0 Attack Vectors
Web 2.0 is the novel term coined for new generation Web applications. start.com, Google maps, Writely and MySpace.com are a few examples. The shifting technological landscape …
A New Approach To Data Protection And Management
In the struggle to ensure data protection, reduce backup windows, and manage costs – both capital and operational – IT managers face increasing challenges. …
Top 5 Tips to NOT Get Hacked Online
“Oh my God, I’m never doing anything on-line again!,” is a common reaction to one of my web application hacking presentations. Recently I’ve been …
Raman Amplification in Storage Area Networking
Enterprise requirements for business-continuity and disaster-recovery solutions continue to grow more demanding. An example can be found in the drive to lengthen the distances …
Using Pict Encrypt for steganography purposes on Mac OS X
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Pict Encrypt …
Featured news
Sponsored
Don't miss
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity
- 25 cybersecurity AI stats you should know
- Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)