News

Last Updated on 24 July 2014, Total: 161 Blog Posts

  1. Netwrix Makes Password Management Free to Small Businesses

    Free password management software enables small businesses to address the most common identity management challenges in a self-service fashion, dramatically increasing security and reducing help desk costs... Read More

  2. New 5nine Cloud Security 4.0 for Hyper-V is Now Available

    Agentless Multi-Tenant Security, Antivirus and VM Isolation Help Enterprises and Cloud Providers to Enforce Security and Compliance for Hyper-V... Read More

  3. New 5nine Manager 4.0 for Hyper-V is Now Available

    Hyper-V Management for SMBs Redefined: Many Microsoft SC VMM Features and Antivirus in a Single Package... Read More

  4. New 5nine Manager 5.0 for Hyper-V is Now Available

    Offering Comprehensive and Easy-to-Use Management for Windows Server 2012 and Hyper-V... Read More

  5. New Amazon AWS China Region

    Amazon has been working with a number of Chinese data centres, bandwidth, and content delivery partners to bring this Region to life... Read More

  6. New GPU design for mobile devices

    Future smartphones and tablet computers can leverage the enhanced performance of the new Mali-T658 GPU designed by ARM. Up to ten times faster than its predecessor, the new GPU is aimed at boosting mobile graphics and increasing ARM's market share in mobile graphics. We have to wait about 2 years to experience the benefits of the new design as ARM... Read More

  7. Next-Generation Security for Services Running On Connected Devices

    ARM Holdings, the leading semiconductor intellectual property (IP) supplier will be leading a joint venture to produce a common security standard for connected devices such as tablets, smart-TVs, games consoles and smartphones. Together with security technology companies, Gemalto a world leader in digital security, and Giesecke & Devrient a leading international technology provider, they will be creating a common security... Read More

  8. No botnet required for low-tech theft

    Pay attention where you leave your security blueprints as these may end up stolen at some train station! Actually, this has happened to a French defence contractor who was carrying blueprints of a drone aircraft being developed jointly by France and United Kingdom. No informatics strategies or high-tech tools were used in this incident! Read the full story here -... Read More

  9. October Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  10. Oracle releases patch for vulnerabilities in Java 7

    Oracle has issued an out-of-cycle patch for vulnerabilities in Java 7 that have been widely exploited to spread malware. This Security Alert addresses security issues CVE-2012-4681 (US-CERT Alert TA12-240A and Vulnerability Note VU#636312) and two other vulnerabilities affecting Java running in web browsers on desktops. These vulnerabilities are not applicable to Java running on servers or standalone Java desktop applications... Read More

Featured Links