Cleaning Data Storage Effectively
Whoever is planning to sell or scrap their old computer, used mobile phone or storage media, should make sure that all files are really deleted.
Cleaning Data Storage Effectively Read More »
Whoever is planning to sell or scrap their old computer, used mobile phone or storage media, should make sure that all files are really deleted.
Cleaning Data Storage Effectively Read More »
The February 2011 MessageLabs Intelligence Report indicated that last month has been the most prolific period in terms of simultaneous attacks and malware family integration across Zeus (aka Zbot), Bredolab and SpyEye.
Security Threats Ad Infinitum in 2011 Read More »
Symantec Corporation’s acquisition of VeriSign’s identity and authentication business, which includes the Secure Sockets Layer (SSL) and Code Signing Certificate Services, the Managed Public Key Infrastructure (MPKI) Services, the VeriSign Trust Seal, the VeriSign Identity Protection (VIP) Authentication Service and the VIP Fraud Detection Service (FDS) has been a strategic step to create the most
Symantec’s Acquisition of VeriSign completes its Business Strategy Read More »
As this issue of Asian e-Marketing focuses on “Security in the Digital Age”, I want to highlight once again an article that Andrew Milroy, ICT Director, ANZ, at Frost & Sullivan wrote.
Cloud Computing More Secure than On-Premise Alternatives Read More »
The success of email is unquestionable, but sadly no one uses it more intensely than spammers.
Ensure You Are Not Labelled a Spammer Read More »
According to a survey conducted by managed security firm Network Box Corporation, over 92 per cent of companies feel that it is important to deploy data-leakage prevention and to pay more attention to the importance of data security.
Network Box’s Data Leakage Prevention Read More »