Video Screencast Help


Search results

You’ve probably heard about spear-phishing – a hacker finds some information about you, poses as a friend or trusted business to get personal information from you via an email, ...
Blog Entry by MelanieLopez | 27 Jun 2013 | 1 comment
  In the same way, the cloud emerged from software virtualization, cloud security can only emerge from the process of virtualizing security itself. As virtualization separated software from hardware, allowing enterprise software to freely move ...
Blog Entry by nicolas_popp | 05 Feb 2012 | 0 comments