General

Last Updated on 27 Nov. 2014, Total: 154 Blog Posts

  1. Cyber attacks test the limits of existing law

    Ten Rules for Cyber Security by Eneken Tikk outline key concepts and areas that must be included or addressed in a comprehensive legal approach to cyber security... Read More

  2. MSExchange.org Webinar: The Hidden Costs of Email Management

    Join J. Peter Bruzzese, Microsoft Certified Trainer and CIO and CoFounder of ClipTraining on Wednesday, March 27, 2013 for a live MSExchange.org webinar, sponsored by Kroll Ontrack. In this complimentary 45 minute Webinar, you will discover:... Read More

  3. Unitrends Unveils Six Secrets Most Backup Vendors Don’t Want You to Know - Part 2

    Part 2 of blog post 'Unitrends Unveils Six Secrets Most Backup Vendors Don’t Want You to Know'... Read More

  4. Unitrends Unveils Six Secrets Most Backup Vendors Don’t Want You to Know - Part 1

    Have you ever had the feeling that you were left in the dark on something while everyone around you was in the know?... Read More

  5. Monthly Newsletters Teaser

    Some salient points from our monthly newsletters... Read More

  6. Another APT Campaign discovered - OPERATION BEEBUS

    APTs focus on stealing personal/organizational sensitive information to achieve financial gain... Read More

  7. Microsoft's 128GB Surface Pro model already sold out

    Microsoft's Surface Pro puts the heat on!... Read More

  8. A 31-minute webinar about Social Media & Cloud Computing Threats to Privacy, Security and Liberty

    WHAT TO TEACH YOUR KIDS, EMPLOYEES AND INTERNS ABOUT SOCIAL MEDIA... Read More

  9. An Open, Safe and Secure Cyberspace

    To safeguard access and openness, to respect and protect fundamental rights online and to maintain the reliability and interoperability of the Internet... Read More

  10. Software Defined Networking

    The key characteristic of Software Defined Networking is the separation of the virtual network from the physical network, through a layer of software that hides the physical topology from the applications... Read More

Featured Links