Please turn on your JavaScript for this page to function normally.
New book: “Programming Amazon Web Services”

The web is full of opportunities for companies both large and small, but smaller companies face a difficult problem: infrastructure. Industrial-strength infrastructure can be …

K-12 schools’ cyber safety declines

CDW Government (CDW-G) announced the results of the 2008 School Safety Index, the national benchmark on the current status of public school district safety. Based on eight …

Information Assurance: National Security’s New Front Line

Nowadays, few would ever consider using the Internet “unprotected” without a reliable anti-virus software and firewall solution installed on their PC networks. Yet …

Home security, monitoring and automation platform

uControl announced a software platform that allows service providers to deploy cutting edge Home Security, Monitoring and Automation (SMA) services. The uControl SMA Platform …

Changes to the Nessus Vulnerability Scanner subscription model

Tenable’s CEO Ron Gula and Nessus creator Renaud Deraison posted a letter to the Nessus community announcing some changes in the subscription model. Since creating and …

Japanese P2P virus writer convicted, but escapes jail

24-year-old Masato Nakatsuji, who was the first ever virus writer to be arrested in Japan when he was apprehended in January, admitted writing the malware which displayed …

Big Book of Windows Hacks

When it comes to "how to" articles there's a wealth of free material available online. With the growing popularity of blogs, a myriad of people are eager to share their hacks …

New book: “The Book of IMAP”

The Internet Message Access Protocol (IMAP) allows clients to access their email on a remote server, whether from the office, a mobile phone, or a hotel room in Outer …

IT spending concerns mounting

An Astaro survey of over 350 attendees of the Interop Las Vegas conference indicates that a 2008 recession will effect IT spending for 52 percent of participants. This is an …

E-mail mismanagement puts organizations at risk

E-mail is arguably the single largest source of information creation for most organizations. Yet for the majority, email is poorly managed – if at all. According to …

Majority of U.S. consumers are likely to enroll in voice verification

According to a study conducted by Harris Interactive for Nuance Communications, consumers are embracing the use of voice verification in protecting important personal …

Mobile signatures and identity services are a success

Mobile signatures transform any mobile phone into an identity card and signature pen for online and mobile services. A user-chosen numerical password, or signing PIN, tells …

Don't miss

Cybersecurity news