If you use multiple Wi-Fi hotspots throughout your day or week, Easy WiFi handles all your various passwords and configurations. It sure makes conducting mobile small business a whole lot easier.
The race to have the fastest JavaScript engine has been fiercely fought by the major browser vendors over the last several years, and today Opera is debuting what it claims is the faster browser yet.
For users of older versions of Windows pressing the F1 key could trigger a new zero-day vulnerability that taps into a flaw in the way VBScript processes help files in Internet Explorer.
Having dodged a widespread backdoor that shut down the protection provided by a number of secure USB drives, SafeStick is establishing itself as an alternative for enterprise security.
From stolen devices and phishing attacks, to buggy apps and human blunders, 2009 was a banner year for data breaches. Here are 10 from which we can learn a lot.
When technology goes through a major phase change, many things can and will go wrong. It happened in the 1990s when enterprises first built web sites, and it's happening today with Facebook and other social networking sites. Enter the conundrum of being simultaneously protective and progressive.
As the use of mobile devices continues to soar, enterprise cloud applications are now resident in the palm of your hand. With this mobility comes ever greater responsibility to keep enterprise data safe.
Its severity is rated "low," but patches are out for the second flaw in DNSSEC to be discovered in three months. DNS experts say some exploits are to be expected as the transition continues.
Netflow has changed since Cisco first introduced it. To get the maximum security benefit from this useful protocol, make sure collectors operating on your network are able to collect, analyze and store Flexible NetFlow templates and data.
When it comes to securing the enterprise, much of what is done has been in vogue for so long and makes sense on the surface. But probe a bit deeper, and much of what has long been held sacrosanct now makes little sense.
Most IT shops have handled the e-mail threat but overlook the rise of the Web as today's primary attack vector. Secure Web gateways that know better than to trust "good" sites will be key to addressing that oversight.