General

Last Updated on 23 June 2014, Total: 152 Blog Posts

  1. Vulnerability in Cryptocat

    A new vulnerability in Cryptocat - the free software that provides an open and encrypted Instant Messaging environment from your browser is known to affect versions 2.0 and 2.0.42 (2.0.42 not included) of this web-based IM... Read More

  2. Vulnerability in Microsoft graphics component could allow remote code execution

    Microsoft is aware of a vulnerability in previous versions of Office that is actively exploited in targeted attacks using crafted Word documents sent by email. The vulnerability will not affect Office 2013 but will affect older versions such as Office 2003 and 2007... Read More

  3. Webinar - Scalable Database Architectures

    Scalable Database Architectures Webinar... Read More

  4. Webinar - The Case for Managing ESI in the Cloud

    How can you better manage your MS Exchange environment and cut down on storage costs? What are the key benefits of managing MS Exchange in the cloud? What is the business case for managing email in the cloud?... Read More

  5. Webinar - The TCO of Windows-to-Go Secure Workplace: Enabling Contractors and Teleworkers

    An interactive webinar that will help you understand what a Mobile Workspace employing Windows-to-Go can and cannot do for you... Read More

  6. Webinar - Unlocking IT with Big Data

    HP Software Web Event - Driving the New Style of IT... Read More

  7. Websense seven security predictions for 2013

    Websense Security Labs, a global leader in unified web, data, and email content security has made its predictions for 2013. Websense report predicts the key threats that the IT technology will face in the coming year which can give you a head start in reviewing your current defenses, identifying security gaps and putting new safeguards in place. The report also... Read More

  8. What are some steps businesses should take to protect their data and reputation?

    Organizations most often overlook simple steps that would help them protect their data! A breach can cost a company monetary and reputation loses hence, companies should consider implementing controls that enhance cyber security. But what is the best approach to guard against cyber security risks? The Division of Corporation Finance, a part of the Securities and Exchange Commission, has issued... Read More

  9. What is Amazon’s Cloud Service Activate?

    AWS Activate is a package of resources for start-ups. It was designed to make it even easier for start-ups to get started and to quickly scale on AWS. It is an international program, with members from all over the world... Read More

  10. Why Can My Devices Be Searched at the Border?

    The U.S. Constitution prevents the government from performing searches without a valid reason; the government generally can't snoop through your laptop for no reason. Electronic data stored on personal devices is a reflection of our lives - family photos, medical documents, banking information, details about what websites we visit, and so much more. But those privacy protections don't safeguard travelers... Read More

Featured Links