Please turn on your JavaScript for this page to function normally.
Nine Ways to Stop Industrial Espionage

If we”re honest every one of us imagine what we’d do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, …

Removable Storage: The New Breed

Today’s advancing broadband technology has allowed large amounts of data to be placed online very cheaply. However, the reliability of internet hosts and the possible …

Malware Evolution: Mac OS X Vulnerabilities 2005 – 2006

This article looks at vulnerabilities detected in MacOS X in the first half of 2006. It compares these vulnerabilities to those detected in the first half of 2005, providing …

Continuous Data Protection

To have a consistent, usable, secure copy of data to store long term, backup is required. Backup is the core of data protection because it provides the ability to recover data …

Essential Security Software for Mac OS X Users

There’s a plethora of Mac OS X security software available but some have proven to be quite exceptional and essential for anyone interested in computer security. Here is …

Successful Backups Are Not Enough

Overview Data protection requirements have moved on from the purely technical question of “Did the backup work?” to the much more complex question of “Is my …

Limiting Vulnerability Exposure Through Effective Patch Management

This paper aims to provide a complete discussion on vulnerability and patch management. It looks first at the trends relating to vulnerabilities, exploits, attacks and …

Securing Wireless, Remote and Mobile Computing – Quick Fixes

The rapid growth of wireless, remote and mobile computing is creating a significant increase in the risks that organisations face. All the indications are that this growth …

The Ten Most Critical Wireless and Mobile Security Vulnerabilities

Inspired by the SANS Top 20, this list is a consensus of industry experts on wireless and mobile vulnerabilities that require immediate remediation. It is offered as a public …

Striking the Balance Between Storage Security and Availability

Every business owner knows that information is much more than one of an organization’s strategic resources. In a very real way, information is the organization. For IT …

Security for Websites – Breaking Sessions to Hack Into a Machine

Security on websites is based on session management. When a user connects to a secure website, they present credentials that testify to their identity, usually in the form of …

Microsoft Patch Tuesday Brings Eight Critical Vulnerabilities

Microsoft alerted us this time about 12 vulnerabilities of which eight were rated critical, three important and one moderate. Here comes another cumulative security update for …

Don't miss

Cybersecurity news