With only three "critical" vulnerabilities to patch in June, you'd think that it was going to be an easy week for system administrators -- but you'd be wrong.
Convenience is great, as long as you don’t inadvertently place your business at risk. We show you how to encrypt the data on those very convenient, if easy-to-lose, flash drives.
Convenience is great, as long as you don’t inadvertently place your business at risk. We show you how to encrypt the data on those very convenient, if easy-to-lose, flash drives.
Looking to protect your e-mail from hackers, especially when you're on the road? For starters, don't use Yahoo. Here are some guidelines to keep your communication secure.
Can your vulnerability management program adapt to local application attack vectors? Nowadays, keeping pace with worms and viruses means getting creative about policies.
Five California hospitals got an expensive reminder of just how serious the state is about protecting patients' sensitive data. Expect more of the same in the near future.
Two new products, Forefront Protection 2010 and Active Directory Federation Services 2.0, are designed to provide secure collaboration for users of Microsoft's SharePoint.
When it comes to securing the enterprise, much of what is done has been in vogue for so long and makes sense on the surface. But probe a bit deeper, and much of what has long been held sacrosanct now makes little sense.
CrazyEgg offers a colorful twist on your small business Web site traffic. Plus, a site for downloading free books and a nifty stopwatch with loads of features.
CrazyEgg offers a colorful twist on your small business Web site traffic. Plus, a site for downloading free books and a nifty stopwatch with loads of features.
<b>Datamation:</b> "The thing that we're noticing was we used to see Firefox gaining any points that IE was losing ... now, we're seeing the growth going to Chrome, for the most part"