Think your anti-virus program is causing a conflict with some other program? Here's how to switch it off for temporary troubleshooting
More than half of DDoS attacks target media vertical
21 November 2014, 16:24. Topics: Security
Trail of destruction
20 November 2014, 14:46. Topics: Security
Microsoft detailed the cause of Azure service interruptions that continued through Wednesday for some customers
20 November 2014, 09:16. Topics: Cloud
Microsoft today released an "out-of-band" security update to patch a vulnerability in all versions of its Windows Server software
19 November 2014, 10:00. Topics: Security
Even Mark Zuckerberg, in theory, can't read your messages
19 November 2014, 09:44. Topics: Security
- US retailers still struggling with data breach security, says BitSight
- Data breaches rose 25 percent to 320 incidents in single quarter, SafeNet figures find
- Android and iOS apps still being cloned to spread malware
- Samsung's Knox to be tightly integrated with BlackBerry's BES12
- Malware served through rogue Tor exit node tied to cyberespionage group
Google has announced 2-Step Verification using a USB Security Key. But what is 2-Step verification and should more people use it?
22 October 2014, 16:28. Topics: Security
Apple's use of one-time-use tokens is the key
20 October 2014, 12:20. Topics: Security
Android 5.0 is Google's sweetest security update so far
17 October 2014, 16:12. Topics: Security
- Microsoft Security Essentials may be throwing false positives for Trojan:DOS/Alureon.J
- Apple Pay's security is impressive - but that won't stop the hackers trying
- 7 tips for protecting your AWS cloud
- Why did Microsoft choose to put its cybersecurity accelerator in Israel?
- Beware the next circle of hell: Unpatchable systems
Inbound email sandboxin, real-time analysis of web traffic and much, much more
Back-up, update, have tough passwords, harden your server - there is much you can do
This technique is not well known, but it's relatively simple
Malnets are extensive distributed network infrastructures embedded in the Internet, but there is something you can do
Need to share some private data but don't want to risk a hack attack? Read on
True, measurable performance is a key factor when selecting an Application Delivery Controller (ADC) solution for modern centres, but with so many different functions available in an ADC, it is important to understand the actual performance of real-world scenarios. While many traditional load balancers and ADCs use special hardware.
Download this white paper to gain insight into real-world application delivery performance.
Today’s enterprises face new requirements for their datacentre and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce
costs and datacentre sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Download this white paper to learn the 9 key datacentre and cloud architecture challenges and how to solve them
The need for robust datacentre security has never been greater. Traditional challenges and concerns—including extensive regulatory requirements, the rise of targeted attacks, and the continuing erosion of perimeter-centric security models—are now being joined by the need to account for highly dynamic enterprise cloud architectures and flat networks with fewer, natural ‘choke points.’ Add the ever-present budgetary pressures to do more with less, and it becomes clear that the foundation for stronger security must be built using existing datacentre infrastructure.
Download this white paper to build a foundation for stronger security within your existing data centre infrastructure.