Search

IT News

8 ways to improve wired network security

We sometimes focus more on the wireless side of the network when it comes to security because Wi-Fi has no physical fences. After all, a war-driver can detect your SSID and launch an attack while sitting out in the parking lot....

18.03.2014

Stupid user tricks: The most embarrassing flubs yet

Technology has made it easier than ever to communicate with colleagues and customers from all over the world. It's also made it easier than ever to make ourselves look very, very stupid....

18.03.2014

Virtual machine (VM) security still a work in progress

Trying to protect your expanding virtual machine (VM) empire will require a security product that can enforce policies, prevent VMs from being terminated or infected, and deliver the virtual equivalents of firewalls, IPS and anti-virus solutions....

18.03.2014

Windows XP can put SOX, HIPAA, credit card security-compliance at risk

When Microsoft stops supporting Windows XP next month businesses that have to comply with payment card industry (PCI) data security standards as well as health care and financial standards may find themselves out of compliance unless they call in some creative fixes, experts say....

18.03.2014

Gartner: Storage spending growing again, but not quickly

Enterprises finally started opening their pocketbooks for external storage systems in the final quarter of last year, but economic uncertainty and the appeal of public cloud services continue to hold back the market, according to research company Gartner....

18.03.2014

7 strategies for a successful DLP strategy

Data Loss Prevention can provide some powerful protection for your sensitive information. It can be used to discover Personal Information (PI) within your environment, identify various forms of PI from names and phone numbers to government identifiers and credit card numbers, assemble multiple subsets of PI to accurately identify a whole record, and even do all of this in multiple languages....

18.03.2014

New methods for addressing insider threats: A roundtable discussion

Technology advances have made it easier to detect subtle, anomalous end-user behavior, such as installation of unusual apps on endpoint devices, or suspicious deviations from baseline activity. This roundtable discussion examines methods to build monitoring, control and context into enterprise insider threat protection efforts – both when dealing with privileged users and regular employees....

18.03.2014

More networking news,features and forums

...

17.03.2014

Techies see future where Web flows like electricity

As the World Wide Web celebrates its 25th year Wednesday, top techies are looking ahead to the next 25 years when they say the Web will be woven more deeply, and seamlessly, into our lives....

17.03.2014

Can anti-virus technology morph into breach detection systems?

Anti-virus software is still often considered a "checkbox" item for enterprise deployments, especially on Microsoft Windows, but over the decades, anti-virus software changed to do far more than just signature-based virus blocking. Today, the question is whether the type of anti-malware product that evolved from virus checking can transform again to be a part of a "breach detection system,"  or BDS...

17.03.2014

    SERVICES

  • - Consultancy and technical support
  • - Marketing support
  • - Training
eXTReMe Tracker