Please turn on your JavaScript for this page to function normally.
Volume and sophistication of attacks to increase

Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …

Microsoft SharePoint 2010: Deploying Cloud-Based Solutions

Take your Microsoft SharePoint solutions to the cloud and gain scalability and high availability while helping to lower your operational costs. Led by a SharePoint expert, …

Easy ways to protect your privacy and data

In spite of one high profile computer security breach after another, many people are still not employing even the most basic safeguards to protect their privacy and their …

The Linux Command Line

Thanks to user-friendly distributions like Ubuntu, more people are running Linux than ever before. But many users stick to the GUI and point and click their way through tasks, …

5 reasons to enforce email monitoring

Managing storage continues to be one of the most significant challenges for email management, but the right tools can change this from a daily headache to an easy win. Email …

CompTIA Network+ N10-005 Authorized Cert Guide

CompTIA Network+ N10-005 Authorized Cert Guide is an exam study guide. Best-selling author and expert instructor Kevin Wallace shares preparation hints and test-taking tips, …

EFF: Don’t use the new AOL Instant Messenger

The Electronic Frontier Foundation advises AOL Instant Messenger users not to switch to the new version of the software because it “introduces important …

The antivirus industry and the grayware problem

Grayware is a general term used often used for spyware, adware, remote access tools, dialers and other applications that cannot be defined strictly as malware, but do affect …

Good device and online safety behavior

With more devices in everyone’s hands after the holidays, children are sure to take their cues from parents and older siblings. Ultimately children will become frequent …

Securing Android for the enterprise

The numbers speak for themselves – Android’s share of the worldwide smartphone market is 52.5 percent, more than double compared to a year ago, according to recent …

Tips to manage top IT trends

ISACA shared recommendations today for managing three of the trends widely cited to dominate the IT landscape in 2012: Big Data, the consumerisation of information technology …

SCADA and PLC vulnerabilities in correctional facilities

Many prisons and jails use SCADA systems with PLCs to open and close doors. Using original and publicly available exploits along with evaluating vulnerabilities in electronic …

Don't miss

Cybersecurity news