Monthly Archives: June 2008
Keynote: Flying KITE in the Cloud
As application developers move from building applications to run on their organization's own servers to writing applications for the cloud, there is more need...
LinkedIn Now Part of Xobni’s Social Inbox
Updated: Xobni, the startup that Microsoft almost bought to socialize its dated Outlook inbox, has now done a mind-meld with professional social network LinkedIn,...
Google Ad Planner No Threat to Nielsen, ComScore
Yesterday, I promised to look into whether or not Nielsen and ComScore were concerned about Google's new Ad Planner tool as some in the...
Microsoft, Adobe Issue Critical Patches
The hits just keep on coming, as two of the world's most high-profile software makers were forced to distribute security updates for critical vulnerabilities...
How to Translate IT Risk Management into Competitive Advantage
Every company has risk. In fact, risk can and should be construed as a good thing-no risk, no reward. What matters is how quickly...
How to Determine a Backup Strategy and Find the Proper Tools to Avoid Disaster
First of all, a small business should analyze its IT structure and determine which nodes of the IT infrastructure are critical for the business....
Virtualization Coming to a Desktop Near You
var sPath = window.location.pathname; var moviename = new Array();...
Five Ways Your Best Employees Can Compromise Your Network … And Not Even Know...
"I'm a small business. No one is going to bother trying to hack my network."Wrong.In fact, 56 percent of small businesses surveyed by the...
Microsoft Responds to the SQL Injection Problem
Last September, Errata Security CEO Robert Graham told us in an interview that SQL Injection was a great risk for Web sites based on...
How to Protect Against a Drive-by Pharming Attack
Drive-by pharming occurs when attackers create a Web page or e-mail that, when simply viewed, results in substantive configuration changes to a home broadband...