Please turn on your JavaScript for this page to function normally.
Governance on unstructured data

Businesses face challenges when implementing sound policies for dealing with their unstructured data, an ever-present thorn in the side of most enterprises today. It is …

The complex information security landscape

In this interview, Latha Maripuri, Director, IBM Security Services and Marc van Zadelhoff, Director of Strategy, IBM Security Solutions, discuss the increasingly complex …

Creating a secure firewall policy for a large company

When it comes to a network security policy, there often seems to be a direct tradeoff between security and maintainability. This doesn’t always have to be the case. Even …

Securing the cloud and securing data in the cloud are not the same

This article will take a look at five of the most impactful vulnerabilities of storing data in the cloud, and offer details on why the most important thing for CSOs and …

A closer look at CleanMyMac

CleanMyMac (v1.9.5) is a cleaning tool for Macs that combines Universal Binaries slimming, removal of unneeded Languages, cleaning Logs and Caches, Quick and Secure erasing, …

A closer look at DropDMG

DropDMG (v3.0.6) is a piece of software that helps you create and work with Mac disk images – Apple’s preferred format for distributing Mac software and the only …

A closer look at NetWrix File Server Change Reporter

In order to cultivate a productive and fast-paced environment, most organizations don’t store their documents on local machines but instead rely on file servers for …

Network security blunders: Tales from the field

We’ve all made one in our career, I’m talking about that blunder you thought you would be fired for. My first blunder was rebooting all the campus router pairs at …

Hacking Unified Communications security

A fundamental shift in the IT security world has taken place. It is the common thread running through these real-world case studies: 1. An enterprise telecoms manager at a …

Application security vulnerabilities

Rafal Los, Application Security Evangelist at HP Software, talks about application security vulnerabilities at the logic level. The inner-workings of an application can only …

Feedback loops in the fight against spam

Nearly everybody gets spam. But do you ever wonder what happens when you click that ‘Report Spam’ button on your mail reader? Does it do anything useful, or is it …

A closer look at Disk Drill PRO

Disk Drill PRO (v1.2.97) is a Mac data recovery software that recovers data from HFS/HFS+, FAT, NTFS and other file systems. Disk Drill locates and recovers deleted files from …

Don't miss

Cybersecurity news