Blogs

View All RSS Feed

Last Updated on 31 July 2015, Total: 1302 Blog Posts

697 George Chetcuti’s Blog
605 Windows Networking Admin Blog
  1. The annual CERT Polska report

    Polish national CERT presents the most important trends and observations that shaped Polish cybersecurity in 2014... Read More

  2. The deployment of IoT devices is ahead of the technology necessary to protect them

    These devices are expected to bring a range of new security and risk challenges to the enterprise... Read More

  3. The desktop is not dead!

    According to a senior analyst at IDC, the main reason behind the laptop success sales figures is price. They are leading the market because they are simply much cheaper than they used to be, and the price gap has gone. However, the desktop remains the first choice for resource hungry applications, durability, scalability and security where thieves are less attracted... Read More

  4. The end of Symantec and Huawei Technologies joint venture!

    The deal that took off four years ago between Symantec and the Chinese company Huawei, to develop computer network security products came to an end as the US government effort to enhance cyber security is producing both direct and indirect benefits! Symantec is a global leader in security, storage and systems management solutions and Huawei is a leading global information... Read More

  5. The first European Cyber Security Month – October 2012

    The Czech Republic, Luxembourg, Norway, Romania, Slovenia, Spain, Portugal, and the United Kingdom are participating with various activities and events throughout October, to raise awareness of cyber security. The objectives of the European Cyber Security Month (ECSM) are to promote cyber security awareness among citizens, to modify their perception of cyber threats, and to provide updated security information through education,... Read More

  6. The importance of log management

    According to recent investigations by Verizon companies are not aware of how precious and important systems logs are! Companies either do not maintain logs or simply ignore them but logs are needed to identify unusual system behavior and track events! Alan Brill, Senior Managing Director at Kroll has published an interesting article on net-security.org that discusses the importance and value... Read More

  7. The new HP Slate 2 Tablet PC

    After withdrawing its TouchPad, HP goes for a new Slate 2 Tablet PC with expanded touch capabilities, enhanced multitasking performance and embedded security, providing added flexibility to mobile business users. An 8.9 inch multi-touch display for touch and pen input, powered by an Intel Atom Z670 processor and mSATA SSM technology with improved boot times and a battery life up... Read More

  8. The state of Cybersecurity

    An ISACA and RSA Conference survey about the state of Cyber-security and its implications for 2015... Read More

  9. The update for Outlook 2007: April 13, 2007

    Outlook 2007 can be pretty slow if your PST files are large. Apparently Microsoft is aware of this issue and the company released an update that should help to rectify this issue: This update fixes a problem in which a calendar item that is marked as private is opened if it is found by using the Search Desktop feature. The... Read More

  10. The world’s fastest single GPU graphics card

    The semiconductor giant Advanced Micro Devices (AMD) has launched the world's fastest single-GPU Graphics card, featuring exceptional performance improvement and enables new levels of gaming and compute capabilities. The AMD Radeon HD 7970's processor is the only GPU based on 28nm production technology. AMD's Eyefinity technology together with AMD's App Acceleration, PCI Express 3 support, better power management, and AMD's... Read More

Featured Links