Expert analysis
Network Attacks: Analysis of Department of Justice Prosecutions 1999 – 2006
A landmark study on Department of Justice network crime prosecutions reveals most attacks used stolen IDs and passwords, resulting in far greater damages to affected …
Intelligent Data Protection in Today’s Enterprise
As information becomes increasingly more valuable to enterprises, IT organizations must overcome some daunting and complex data protection challenges, such as recoverability, …
Assessing Java Clients with the BeanShell
Assessing the security of Java applications, and particularly client-server applications, can be a tedious process of modifying the code, compiling, deploying, testing and …
What Should Businesses Require of Data Protection Solutions?
Data protection today is one of the most innovative and fast-moving areas of Information Technology. Data protection technology developers have, in recent years, engaged in …
How to Start Up a Mobile Security Project
The proliferation of laptops, PDAs, smartphones and USB sticks means that corporate data is no longer confined to the office. Without a joined-up policy on mobile security, …
10 Tips for Reducing Storage TCO
Relying on big vendors to design and implement your storage systems is often considered a safe approach. However, it allows vendors to take control over your storage systems …
Nine Ways to Stop Industrial Espionage
If we”re honest every one of us imagine what we’d do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, …
Removable Storage: The New Breed
Today’s advancing broadband technology has allowed large amounts of data to be placed online very cheaply. However, the reliability of internet hosts and the possible …
Malware Evolution: Mac OS X Vulnerabilities 2005 – 2006
This article looks at vulnerabilities detected in MacOS X in the first half of 2006. It compares these vulnerabilities to those detected in the first half of 2005, providing …
Continuous Data Protection
To have a consistent, usable, secure copy of data to store long term, backup is required. Backup is the core of data protection because it provides the ability to recover data …
Essential Security Software for Mac OS X Users
There’s a plethora of Mac OS X security software available but some have proven to be quite exceptional and essential for anyone interested in computer security. Here is …
Successful Backups Are Not Enough
Overview Data protection requirements have moved on from the purely technical question of “Did the backup work?” to the much more complex question of “Is my …
Featured news
Resources
Don't miss
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders