Please turn on your JavaScript for this page to function normally.
Super Power Password Protection – Watching You Watching Me

Not a day goes by without some story hitting the wires about yet another piece of confidential information appearing in somebody’s inbox. Confidential emails, files, …

Data Storage Security – Quo Vadis

Today, industry trends are forcing security in the data center to be re-thought. In particular, the trend towards consolidation results in increasingly centralised data …

Computers, Networks and Theft

Computers have become an integral part of our lives. Every day more and more users and organizations use them to store data which is a type of property. Although most people …

Interview with Marc Vaillant, CEO of Criston

Since the start of his career, Marc Vaillant has always worked in the high-tech sector, holding positions in companies of various sizes. Before joining Criston, he was Chief …

Data Protection Management: Shedding Light on Complex Infrastructures

Data protection strategies have become significantly more complex in recent years. Companies that used to rely on a single-vendor tape backup solution are now using disk-based …

Top 10 Web 2.0 Attack Vectors

Web 2.0 is the novel term coined for new generation Web applications. start.com, Google maps, Writely and MySpace.com are a few examples. The shifting technological landscape …

A New Approach To Data Protection And Management

In the struggle to ensure data protection, reduce backup windows, and manage costs – both capital and operational – IT managers face increasing challenges. …

Top 5 Tips to NOT Get Hacked Online

“Oh my God, I’m never doing anything on-line again!,” is a common reaction to one of my web application hacking presentations. Recently I’ve been …

Raman Amplification in Storage Area Networking

Enterprise requirements for business-continuity and disaster-recovery solutions continue to grow more demanding. An example can be found in the drive to lengthen the distances …

Using Pict Encrypt for steganography purposes on Mac OS X

Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Pict Encrypt …

Constructing Secure Storage Area Networks

Increasingly concerned about the availability of their business data, many enterprises over the last five years have implemented sophisticated storage area networks (SANs). …

Interview with Vladimir Katalov, CEO of ElcomSoft

Vladimir Katalov is working in ElcomSoft from the very beginning. He created the first program the password recovery software line has started from: Advanced ZIP Password …

Don't miss

Cybersecurity news