General

Last Updated on 13 Nov. 2014, Total: 153 Blog Posts

  1. Vulnerability in Cryptocat

    A new vulnerability in Cryptocat - the free software that provides an open and encrypted Instant Messaging environment from your browser is known to affect versions 2.0 and 2.0.42 (2.0.42 not included) of this web-based IM... Read More

  2. Vulnerability in Microsoft graphics component could allow remote code execution

    Microsoft is aware of a vulnerability in previous versions of Office that is actively exploited in targeted attacks using crafted Word documents sent by email. The vulnerability will not affect Office 2013 but will affect older versions such as Office 2003 and 2007... Read More

  3. Webinar - Scalable Database Architectures

    Scalable Database Architectures Webinar... Read More

  4. Webinar - The Case for Managing ESI in the Cloud

    How can you better manage your MS Exchange environment and cut down on storage costs? What are the key benefits of managing MS Exchange in the cloud? What is the business case for managing email in the cloud?... Read More

  5. Webinar - The TCO of Windows-to-Go Secure Workplace: Enabling Contractors and Teleworkers

    An interactive webinar that will help you understand what a Mobile Workspace employing Windows-to-Go can and cannot do for you... Read More

  6. Webinar - Unlocking IT with Big Data

    HP Software Web Event - Driving the New Style of IT... Read More

  7. Websense seven security predictions for 2013

    Websense Security Labs, a global leader in unified web, data, and email content security has made its predictions for 2013. Websense report predicts the key threats that the IT technology will face in the coming year which can give you a head start in reviewing your current defenses, identifying security gaps and putting new safeguards in place. The report also... Read More

  8. What are some steps businesses should take to protect their data and reputation?

    Organizations most often overlook simple steps that would help them protect their data! A breach can cost a company monetary and reputation loses hence, companies should consider implementing controls that enhance cyber security. But what is the best approach to guard against cyber security risks? The Division of Corporation Finance, a part of the Securities and Exchange Commission, has issued... Read More

  9. What does a mobile devices manufacturer know about its customers?

    Nowadays every electronic device can potentially steal our data and send it to some company in another part of the world, in absolute silence... Read More

  10. What is Amazon’s Cloud Service Activate?

    AWS Activate is a package of resources for start-ups. It was designed to make it even easier for start-ups to get started and to quickly scale on AWS. It is an international program, with members from all over the world... Read More

Featured Links