Video Screencast Help

Search

Search results

Tips from the FTC on Fraud, Deception and Consumer Privacy It seems like every week another major company experiences a data breach. 2013 was a rough year for organiza tions ...
Blog Entry by Matthew Nelson | 25 Apr 2014 | 0 comments
Give an attacker a phish and he will steal some data. Teach an attacker to spear phish and he will steal data bases.   Among the wide diversity of threats facing the modern enterprise, targeted attacks are often the most troubling and difficult ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
An SSL certificate is a mode of authenticating a website and securing the transactions, as well as the data communicated through the website by users. It is, therefore, a critical tool for any website that is involved in e-commerce or similar ventures. ...
Blog Entry by smartblogger | 28 Jan 2014 | 0 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
Webcast Tue, 15 October, 2013 - 10:00 - 11:00 PDT Join our upcoming webcast to learn about a new ...
Event by Elspeth Magoria | 26 Sep 2013 | 0 comments
Now, more than ever, is it important to demand that your cloud services provider provides complete transparency regarding the security and compliance measures they use and have in place to protect your companies’ sensitive information and intellectual ...
Blog Entry by phlphrrs | 27 Aug 2013 | 0 comments
Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by rshaker2 | 29 Jul 2013 | 4 comments
With the additional functionality/integration between SSIM and GIN in 4.81, there’s an enhancement request we would like to make:   Periodically, we run into situations where we will max-out the resources of SSIM if we add large quantities of ...
Idea by Another IT Person | 10 Jun 2013 | 0 comments
You must have been taking a long (and probably well deserved) holiday if you have not noticed the increasing use of the term “cyber” in the press recently. Anything security related is now a cyber risk, a cyber incident or a cyber attack. Governments ...
Blog Entry by James Hanlon | 10 Jun 2013 | 1 comment
Does your customer have a requirement for monitoring servers or for Intrusion Detection? Are they asking about Real-time File Integrity Monitoring (FIM)? Have they recently failed an IT compliance or regulatory audit?   Usually a request to ...
Blog Entry by MFox70 | 31 May 2013 | 1 comment