• October 01, 2006 01 Oct'06

    New exploits target Microsoft's PowerPoint, IE

    Microsoft may have patched the VML flaw in Internet Explorer, but now it faces new threats against the Web browser and PowerPoint.  Continue Reading

  • October 01, 2006 01 Oct'06

    The myths and realities of VoIP security

    Security is often cited as one of the primary reasons organizations have not deployed VoIP. Kerravala, Yankee Group analyst, cuts through the hype so network managers can maximise the reliability of their voice network.  Continue Reading

  • September 30, 2006 30 Sep'06

    PING with Suzanne Hall

    In this exclusive interview with Information Security magazine, Suzanne Hall, AARP director of IT operations and security, examines how security professionals can enable telecommuters and mobile workers while keeping their data secure.  Continue Reading






  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...