Blogs

View All RSS Feed

Last Updated on 27 March 2015, Total: 1236 Blog Posts

632 George Chetcuti’s Blog 27 March 2015
604 Windows Networking Admin Blog 6 June 2014
  1. Iot - more devices to secure against hackers

    IoT is likely to disrupt business models and ecosystems across a range of industries... Read More

  2. Therapy for Health Care System’s Information Security

    Netwrix outlines top tips that will help health care providers protect sensitive data from being compromised... Read More

  3. Windows 7 lifecycle fact sheet

    Knowing key dates in this lifecycle helps you make informed decisions about when to upgrade or make other changes to your software... Read More

  4. Disrupting The Market – 3rd Generation Backup Appliances

    Unitrends has announced their third generation of backup appliances... Read More

  5. Security updates available for Adobe Flash Player

    Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux... Read More

  6. NCP engineering Enhances Windows 10 VPN Clients with Newly Added Security Features

    Version 10 of NCP's VPN Client Suites for Windows and Juniper Feature Optimized Configuration, Easier Software Distribution and Administrator Control... Read More

  7. Q&A with Unitrends CEO Kevin Weiss

    Kevin Weiss is Unitrends new president and chief executive officer (CEO). Weiss talks about his skills and his vision on how to turn Unitrends into a market leader for data protection solutions... Read More

  8. Google’s rendering-based indexing best practices

    Google’s Webmaster Guidelines update for optimal indexing in view of the recently announced change of rendering web pages more like a typical modern browser rather than as a text-only browser... Read More

  9. Unitrends Names Kevin Weiss President and CEO

    Experienced business executive to drive data protection leader’s explosive growth... Read More

  10. Microsoft senses an increasing trend of macro malware

    New threats emerging that include some form of social engineering to convince users to manually enable macros and allow potential malicious code to run... Read More

Featured Links