General

Last Updated on 13 Nov. 2014, Total: 153 Blog Posts

  1. Latest TMG and UAG tech feeds

    Microsoft Forefront UAG - Configuring Forefront UAG as a DirectAccess Server (Part 2) In this article the author explains how to configure Forefront UAG as a DirectAccess Server. Comprehensive Overview of Web and Server Publishing Rules in TMG 2010 (Part 10) In this article we take a look at the details of the Server Publishing Rule we created and find... Read More

  2. Last chance to sign up to the Spear Phishing: The Cost of Damages and How to Create the ROI Case for Bolstering your Defenses webinar!

    Spear phishing has quickly evolved into one of the dangerous forms of spam. Phishing emails, designed to steal passwords, banking info, and other sensitive information, have become very common and very costly. Many IT and Security professionals know they need to bolster their defenses but are having trouble justifying new investments internally with a good ROI case. Join Michael Osterman... Read More

  3. Cyber Warfare - electronic pulse cannon

    Scientists are a step closer to developing a weapon that could change modern warfare with its potential to target cyber terrorists and disable enemy nuclear facilities by blowing up their computer systems. Read more here - http://news.sky.com/story/1019596/cyber-warfare-missile-can-cripple-computers... Read More

  4. Greenpeace's Guide to Greener Electronics

    This 18th edition of Greenpeace's Guide to Greener Electronics evaluates leading consumer electronics companies based on their commitment and progress in three environmental criteria: Energy and Climate, Greener Products, and Sustainable Operations. The Guide scores companies on overall policies and practices – not on specific products – to provide consumers with a snapshot of the sustainability of the biggest names... Read More

  5. Crafty Malware

    Although, it's a recommended best practice to test and debug malware in an isolated and contained environment, this post by Marco Ramilli explains how crafty malware can eventually detect this environment and behave in a different way. Malware can detect virtualized environments, active debuggers and sandbox environments. Briefly, malware authors can easily insert code into their software that detects such... Read More

  6. Websense seven security predictions for 2013

    Websense Security Labs, a global leader in unified web, data, and email content security has made its predictions for 2013. Websense report predicts the key threats that the IT technology will face in the coming year which can give you a head start in reviewing your current defenses, identifying security gaps and putting new safeguards in place. The report also... Read More

  7. Complex systems break in complex ways

    According to Peter G. Neumann, an 80-year-old computer scientist at SRI International, the increasing complexity of modern hardware and software has made it virtually impossible to identify the flaws and vulnerabilities in computer systems and ensure that they are secure. Peter's intuition is that complexity has become something that people don't want to hear about and the inclination is now... Read More

  8. MS Exchange Webinar: Myths and Best Practices of Email Archiving

    What archiving features are coming in MS Exchange 2013? What are the top myths and misconceptions when it comes to MS Exchange and email archiving? Why is email archiving considered the "Swiss Army Knife" of the IT world because it solves so many groups' problems in one solution? Read more and Register here!... Read More

  9. VirtualizationAdmin.com monthly newsletter

    The below extract is taken from September's VirtualizationAdmin.com monthly newsletter authored by Scott Lowe. 'I'll start by saying that I'm a fan of both vSphere and Hyper-V. Both have a place in the world. With the release of Windows Server 2012 has come Hyper-V Server 2012 along with a whole lot of incorrect information making its way around the Internet... Read More

  10. Windows Azure AD Rights Management tools

    Windows Azure AD Rights Management provides the ability to enable the use of digital rights management technology in organizations that subscribe to the Office 365 preview services. Office 365 Preview customers can enable rights management capabilities within the Preview versions of Exchange Online, SharePoint and Office. These downloads enable an administrator to manage Windows Azure AD rights management features and... Read More

Featured Links