Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured videos

Articles about Security

Billion Electric BiGuard S10

Billion Electric BiGuard S10

By doing away with the need for additional client software, SSL VPN gateways have revolutionised the remote LAN access market of late, making life simpler for end users and network managers alike. However, they’re mostly implemented as standalone appliances, which means yet another box to setup and manage. But not if you opt for the new <a href="http://www.billion.uk.com/product/biguard/biguards10.htm">BiGuard S10</a> from Billion Electric, which comes with an integrated router and firewall as well as an SSL VPN gateway.

November 22, 2006 by in Security

Microsoft Private Folder 1.0 screenshots

Microsoft Private Folder 1.0 screenshots

Microsoft's Private Folder 1.0 lets users store files in an encrypted, password-protected folder. This gallery's 30-plus images show the installation process, Private Folder in action, and what happens with you uninstall the application.You can download Private Folder 1.0 from Microsoft's Web site.Read my blog for an explanation of why I believe Private Folder 1.0 could mean headaches for both IT pros and end-users.Submitted by Bill Detwiler

August 28, 2006 by in Security

Short clip: Verisign's top security threats of 2009

Ken Silva, CTO of Verisign, says that the top security threats are identity theft, denial of service attacks, and the hacking of any personal information. He describes these threats as tens of millions of little weapons, ready to attack from anywhere, and says we'll have to worry about them well into 2010 and even 2011.

February 10, 2009 in Security

Verisign CTO: Aligning security and innovation

Ken Silva, CTO of Verisign, says blocking new technologies from coming into your company isn't a smart strategy. Eventually, he says, someone at the top will want to use their iPhone or other mobile device, so planning to do this securely is more savvy.

February 10, 2009 in Security

Most Popular