Please turn on your JavaScript for this page to function normally.
Cisco and Lumos Networks prepare fiber infrastructure for 100G network

Lumos Networks, a fiber-based service provider, has successfully completed a technology test of Cisco’s 100G coherent DWDM solution across its service area. This …

Open source audit plug-in for MySQL

McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and …

New cloud disaster recovery service

EVault announced a four-hour option for its Cloud Disaster Recovery Service (EVault CDR) with a guaranteed SLA. The EVault CDR four-hour managed service includes an SLA-backed …

Exploiting legitimate online technology

Criminals intent on distributing images of children being sexually abused are finding new ways of exploiting legitimate online technology, according to the Internet Watch …

Data center industry dynamics

While interest around data center services (DCS) is extremely high, the market structure, dynamics and maturity differ across the world, according to Gartner. The shift toward …

Microsoft disrupts massive cybercrime operation

In its most complex effort to disrupt botnets to date, Microsoft, in collaboration with the financial services industry — including the Financial Services – Information …

Free online tool teaches IT security procedures

AVG Technologies launched SMB BootCamp, a free, online tool to help SMBs demonstrate to customers that their company is seriously committed to following AVG’s …

Week in review: Facebook privacy loophole, Duqu still active, the world of vulnerability sellers

Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: US govt and military email addresses offered for sale Webroot has …

Securing SharePoint

Microsoft SharePoint enables information sharing and report publishing. It also provides a search facility for users to find content. The problem is that, all too easily, any …

Plan to reduce botnets launched

More than one in ten U.S. computers are infected by difficult-to-detect bots, which botmasters can use for anything from sending spam, to eavesdropping on network traffic, to …

Ghost in the Wires

Kevin Mitnick accessed computers and networks at the world’s biggest companies – and however fast the authorities were, Mitnick was faster, sprinting through phone …

Data breach vulnerabilities in the workplace

Many business professionals don’t realize that when their company’s confidential information is at risk, so too is the information of its clients, vendors, …

Don't miss

Cybersecurity news