Please turn on your JavaScript for this page to function normally.
SuperSpeed USB (USB 3.0) at 10 Gbps with new capabilities

The USB 3.0 Promoter Group announced development of a SuperSpeed USB (USB 3.0) enhancement that will add a much higher data rate, delivering up to twice the data through-put …

Lenovo and EMC to bring Network Attached Storage to SMBs

Lenovo and EMC have completed the formation of LenovoEMC Ltd, the joint venture with a wider strategic partnership in industry standard servers and networked storage …

Keycard: Unlock your Mac using an iOS device

Keycard allows you to pair your iPhone or other Bluetooth enabled device with your Mac to lock and unlock your computer. It detects when you’re leaving your desk, …

Training Guide: Installing and Configuring Windows Server 2012

Designed to help enterprise administrators develop real-world, job-role-specific skills, this Training Guide focuses on deploying and managing core infrastructure services in …

Week in review: IE zero-day used in active attacks, fraudulent digital certificate for Google domains revoked

Here’s an overview of some of last week’s most interesting news, reviews and articles: Database hacking: The year that was Have you ever been to the Privacy Rights …

Microsoft to release seven advisories on Tuesday

The first Microsoft Patch Tuesday of 2013 includes 7 advisories (MS13-001 – MS13-007), two of which are listed as critical because they can be executed remotely. One of …

Object storage predictions for 2013

Object storage is primed for growth, according to Mark Goros , CEO of Caringo, a provider of object storage software. Goros predicts 2013 will include a number of advancements …

Google to change business practices to resolve FTC concerns

Google has agreed to change some of its business practices to resolve Federal Trade Commission concerns that those practices could stifle competition in the markets for …

Improve your firewall auditing

As a penetration tester you have to be an expert in multiple technologies. Typically you are auditing systems installed and maintained by experienced people, often protective …

Rapid-fire changes to information security strategies

RSA released a special report from the Security for Business Innovation Council (SBIC) that assesses how disruptive innovations such as Big Data analytics, cloud computing, …

Video surveillance for critical IT systems

NetWrix has announced its new User Activity Video Reporter tool that acts like a surveillance camera for critical servers and other IT systems by recording user activity for …

Bad Data Handbook

What is bad data? Some people consider it a technical phenomenon, like missing values or malformed records, but bad data includes a lot more. In the Bad Data Handbook, data …

Don't miss

Cybersecurity news