General

Last Updated on 13 April 2015, Total: 160 Blog Posts

  1. An Examination of the Cybersecurity Labor Mark

    The not-for-profit institution RAND carried out a study about the current status of the labor market for cybersecurity professionals... Read More

  2. Operation WOOLEN-GOLDFISH

    State-sponsored cyberwarfare is no different than physical battles or terrorist attacks in terms of scope and damage. The Rocket Kitten group used spear-phishing emails in order to penetrate their target systems... Read More

  3. March Fav Links

    Exclusive: Google is working on a new VPN service for use on open WiFi networks... Read More

  4. The 20 percent of Outlook features that produce 80 percent of your desired results

    The Ultimate Help Guide to Using Outlook - Streamline Tasks, Boost Productivity and Get Ahead... Read More

  5. Q&A with Unitrends CEO Kevin Weiss

    Kevin Weiss is Unitrends new president and chief executive officer (CEO). Weiss talks about his skills and his vision on how to turn Unitrends into a market leader for data protection solutions... Read More

  6. Google’s rendering-based indexing best practices

    Google’s Webmaster Guidelines update for optimal indexing in view of the recently announced change of rendering web pages more like a typical modern browser rather than as a text-only browser... Read More

  7. "Body recognition" compares with fingerprint ID

    A range of human anatomical features and body measurements can help to identify a person, such as from closed circuit television (CCTV) security videos, no matter what clothing the person may be wearing... Read More

  8. What does a mobile devices manufacturer know about its customers?

    Nowadays every electronic device can potentially steal our data and send it to some company in another part of the world, in absolute silence... Read More

  9. Unitrends Unveils Six Secrets Most Backup Vendors Don’t Want You to Know - Part 2

    Part 2 of blog post 'Unitrends Unveils Six Secrets Most Backup Vendors Don’t Want You to Know'... Read More

  10. Cyber attacks test the limits of existing law

    Ten Rules for Cyber Security by Eneken Tikk outline key concepts and areas that must be included or addressed in a comprehensive legal approach to cyber security... Read More

Featured Links