The dramatic rise in phishing and identity theft attacks includes a well-organized offline component—the not-so-innocent "money mule" recruited by fraudsters to launder stolen money...
Firefox 2.0 is almost here, and Microsoft is expected to start pushing out Internet Explorer 7 to users via the Windows Automatic Update software-distribution...
Network storage systems provider Pillar Data Systems is expanding beyond its midmarket roots with systems that target both small businesses and larger enterprises.
New enhancements...
ConSentry Networks LANShield Controller CS2400, now with LANShield OS 2.2, provides perimeter-level network access and security controls within the LAN. The solution also takes...
Who doesnt want better management and accountability for meetings? Ah, but what tools exist to achieve those results? GroupSystems ThinkTank 1.1 does a good...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...