The StopBadware.org coalition, funded by Google, has listed the Kazaa file-sharing application at the top of a list of noxious software programs that present...
Researchers at Websense Security Labs have stumbled upon a password-stealing Trojan that uses sophisticated DNS redirection techniques to dodge server shutdowns and hijack online...
Uganda, Senegal, Uzbekistan, Moldova, Ecuador, Haiti—name any impoverished country in the world, and the U.S. Agency for International Development is probably there on the...
Enterprise users of Symantecs integrated threat protection systems can now extend that protection to remote and branch offices with the introduction of two midsize...
DesktopStandards PolicyMaker Application Security 2.5 provides outstanding tools to help companies solve the problem of application compatibility in restricted desktop environments. However, the Microsoft...
Convoq App Melds With SalesforceSellASAP for AppExchange does a good job of blending Convoqs Web conferencing features into the context of selling in Salesforce....
Id pay to listen to any conversation including Lawrence Lessig (a Stanford Law School professor and widely published scholar of copyright issues) and Greg...
Anti-virus powerhouse McAfee was left wiping egg from its face after shipping a virus definition update that incorrectly flagged hundreds of legitimate software programs...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...