Government hacking or Heartbleed won't be held up by deploying a password manager but your life will be improved
Will it silence doubters?
19 December 2014, 17:36. Topics: Security
Around 200 models affected going back to 2002, says Check Point
18 December 2014, 15:16. Topics: Security
The November 18-19 outage was caused by an update that Microsoft personnel assumed to be sound, but wasn't
18 December 2014, 08:57. Topics: Cloud
- Dutch regulator asks Facebook to hold off on privacy update, is rebuffed
- First lawsuit filed against Sony after massive hack
- TorrentLocker ransom rampage encrypts 285 million files and counting
- Quantum physics deployed in quest for fraud-proof credit cards
- Android apps exploit permissions granted, French researchers find
From connected guns to wearables for canine units, the IoT is spurring change in the law enforcement field.
13 December 2014, 01:09. Topics: Apps
Goal-line technology has finally arrived - as well as drones - but what other innovations will the future hold?
10 December 2014, 18:20. Topics: Personal Tech
Monitors behaviour of people inside the network instead of trying to keep them out
25 November 2014, 16:40. Topics: Security
- Republican gains in Congress would have limited impact on big tech issues
- Google’s 2-Step Verification – why everybody should turn this on now
- Apple Pay probably secure from known NFC spoofing techniques
- Android 5.0 Lollipop – top enterprise security features
- The BadUSB exploit is deadly, but few may be hit
Deloitte has published ways to figure out if an organization has really been breached
Think your anti-virus program is causing a conflict with some other program? Here's how to switch it off for temporary troubleshooting
Inbound email sandboxin, real-time analysis of web traffic and much, much more
Back-up, update, have tough passwords, harden your server - there is much you can do
This technique is not well known, but it's relatively simple
Also in slideshows:
True, measurable performance is a key factor when selecting an Application Delivery Controller (ADC) solution for modern centres, but with so many different functions available in an ADC, it is important to understand the actual performance of real-world scenarios. While many traditional load balancers and ADCs use special hardware.
Download this white paper to gain insight into real-world application delivery performance.
Today’s enterprises face new requirements for their datacentre and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce
costs and datacentre sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Download this white paper to learn the 9 key datacentre and cloud architecture challenges and how to solve them
The need for robust datacentre security has never been greater. Traditional challenges and concerns—including extensive regulatory requirements, the rise of targeted attacks, and the continuing erosion of perimeter-centric security models—are now being joined by the need to account for highly dynamic enterprise cloud architectures and flat networks with fewer, natural ‘choke points.’ Add the ever-present budgetary pressures to do more with less, and it becomes clear that the foundation for stronger security must be built using existing datacentre infrastructure.
Download this white paper to build a foundation for stronger security within your existing data centre infrastructure.