Expert analysis
The Changing Face of Disaster Recovery
Disaster recovery and remote office replication are increasingly becoming top-of-mind issues for IT professionals. It is ironic that tape, the most operationally unpredictable …
Network Attacks: Analysis of Department of Justice Prosecutions 1999 – 2006
A landmark study on Department of Justice network crime prosecutions reveals most attacks used stolen IDs and passwords, resulting in far greater damages to affected …
Intelligent Data Protection in Today’s Enterprise
As information becomes increasingly more valuable to enterprises, IT organizations must overcome some daunting and complex data protection challenges, such as recoverability, …
Assessing Java Clients with the BeanShell
Assessing the security of Java applications, and particularly client-server applications, can be a tedious process of modifying the code, compiling, deploying, testing and …
What Should Businesses Require of Data Protection Solutions?
Data protection today is one of the most innovative and fast-moving areas of Information Technology. Data protection technology developers have, in recent years, engaged in …
How to Start Up a Mobile Security Project
The proliferation of laptops, PDAs, smartphones and USB sticks means that corporate data is no longer confined to the office. Without a joined-up policy on mobile security, …
10 Tips for Reducing Storage TCO
Relying on big vendors to design and implement your storage systems is often considered a safe approach. However, it allows vendors to take control over your storage systems …
Nine Ways to Stop Industrial Espionage
If we”re honest every one of us imagine what we’d do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, …
Removable Storage: The New Breed
Today’s advancing broadband technology has allowed large amounts of data to be placed online very cheaply. However, the reliability of internet hosts and the possible …
Malware Evolution: Mac OS X Vulnerabilities 2005 – 2006
This article looks at vulnerabilities detected in MacOS X in the first half of 2006. It compares these vulnerabilities to those detected in the first half of 2005, providing …
Continuous Data Protection
To have a consistent, usable, secure copy of data to store long term, backup is required. Backup is the core of data protection because it provides the ability to recover data …
Essential Security Software for Mac OS X Users
There’s a plethora of Mac OS X security software available but some have proven to be quite exceptional and essential for anyone interested in computer security. Here is …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?