Expert analysis
A New Approach To Data Protection And Management
In the struggle to ensure data protection, reduce backup windows, and manage costs – both capital and operational – IT managers face increasing challenges. …
Top 5 Tips to NOT Get Hacked Online
“Oh my God, I’m never doing anything on-line again!,” is a common reaction to one of my web application hacking presentations. Recently I’ve been …
Raman Amplification in Storage Area Networking
Enterprise requirements for business-continuity and disaster-recovery solutions continue to grow more demanding. An example can be found in the drive to lengthen the distances …
Using Pict Encrypt for steganography purposes on Mac OS X
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Pict Encrypt …
Constructing Secure Storage Area Networks
Increasingly concerned about the availability of their business data, many enterprises over the last five years have implemented sophisticated storage area networks (SANs). …
Interview with Vladimir Katalov, CEO of ElcomSoft
Vladimir Katalov is working in ElcomSoft from the very beginning. He created the first program the password recovery software line has started from: Advanced ZIP Password …
The Changing Face of Disaster Recovery
Disaster recovery and remote office replication are increasingly becoming top-of-mind issues for IT professionals. It is ironic that tape, the most operationally unpredictable …
Network Attacks: Analysis of Department of Justice Prosecutions 1999 – 2006
A landmark study on Department of Justice network crime prosecutions reveals most attacks used stolen IDs and passwords, resulting in far greater damages to affected …
Intelligent Data Protection in Today’s Enterprise
As information becomes increasingly more valuable to enterprises, IT organizations must overcome some daunting and complex data protection challenges, such as recoverability, …
Assessing Java Clients with the BeanShell
Assessing the security of Java applications, and particularly client-server applications, can be a tedious process of modifying the code, compiling, deploying, testing and …
What Should Businesses Require of Data Protection Solutions?
Data protection today is one of the most innovative and fast-moving areas of Information Technology. Data protection technology developers have, in recent years, engaged in …
How to Start Up a Mobile Security Project
The proliferation of laptops, PDAs, smartphones and USB sticks means that corporate data is no longer confined to the office. Without a joined-up policy on mobile security, …