The latest report issued by Finjans Malicious Code Research Center highlights the growth of several emerging breeds of cyber-attack, including the increasing popularity of...
Is AT&T, BellSouth or SBC Verizon your phone company? Yes? Congratulations. The National Security Agency has your numbers—all of them.
They know whos been calling...
A "highly critical" flaw in RealVNCs virtual network computing software could allow malicious hackers to access a remote system without a password, according to...
Given the constantly evolving compliance and legal discovery needs in many IT organizations, innovative disk-based backup solutions like Avamar Technologies Axion 3.5 will be...
As administrators deal with conditions of worsening desktop security, lost user productivity and reduced system performance, anti-spyware defenses have emerged as a necessary layer...
Sturdevant advises that the time is now for IT managers to make strategic decisions about which network access control products they need, whether they...
BOSTON—His title may be the first assistant United States Attorney for the Northern District of Ohio, but Craig Morfords work fighting cyber-crime touches nearly...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...