Security news and support resources, featuring the hottest solutions, technologies and vendors in the Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Security

Security

Password Best Practices Using Remote Desktop Manager

Devolutions
How can Remote Desktop Manager help make your system more secure? How can RDM help you ensure that your whole organization implements its password policy best practices? Even if your user guidelines for password security are clear as water, if you look hard enough, I can guarantee you’ll find at least one person in your […]

Top 3 reasons to attend DockerCon 2018

Docker
In case you missed it, DockerCon 2018 will take place at Moscone Center in San Francisco, CA on June 13-15, 2018. DockerCon is where the Docker community comes to learn, belong, and collaborate. Attendees are a mix of beginner, intermediate and advanced users who are all looking to level up their skills and go home inspired. With […]

New VMware KB articles published for week ending 11th February 2018

VMware
VMware vRealize Operations for Published Applications V4PA Broker agent utility controller credentials entries get removed Date Published:2018/2/5 VMware ESXi Windows Server version 1709 crashes or restarts automatically when hot adding vCPU Date Published:2018/2/5 16.04 VM (from .ova file) hangs at “non blocking pool is initialized” during booting Date Published:2018/2/6 VMware Tools ‘VMware Tools user service’ […]

Malware copies file to evade anti-virus, detection-based cybersecurity tools

Bromium
New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers continue to deliver sophisticated malware that evades detection The Bromium Lab is back to break down a recent outbreak of sneaky malware, shared with us by some of our customers who caught […]

IGEL Marks Record Software Sales Growth for the Year Ended 2017

IGEL Technology
U.S. Revenue Grows 74% Driven by a 589% Increase in U.S. Software License Revenue IGEL, a world leader in endpoint management software for the secure enterprise, today announced record results for the year ended 2017 with 74% revenue growth in the U.S., year-over-year. Growth was significantly driven by record software sales, which were up 589% […]

Demand for Veeam Backup for Microsoft Office 365 Accelerates as Enterprises Move to the Cloud

Veeam
More than 25,000 organizations, representing 2.3 million Microsoft Office 365 mailboxes, have downloaded Veeam Backup for Microsoft Office 365 to protect their data Veeam reports 327 percent quarter–over–quarter revenue growth of Veeam Backup for Microsoft Office 365 Huge adoption on the heels of the most successful fiscal year for Veeam’s Cloud business, reporting 50 percent […]

VMware Named a Leader in 2018 Magic Quadrant for Hyperconverged Infrastructure

VMware
VMware, Inc. (NYSE:VMW) today announced that VMware has been positioned in the Leaders quadrant of Gartner, Inc.’s 2018 Magic Quadrant for Hyperconverged Infrastructure. (1) “In our view, Gartner has recognized the important role software plays in powering next-generation hyperconverged infrastructure in this report,” said Lee Caswell, vice president of product, Storage and Availability Business Unit, VMware. “We believe this Magic Quadrant for Hyperconverged […]

Worldline Selects VMware Network Virtualization and Cloud Management Platforms to Accelerate Innovation and Time to Market

VMware
Shorter application development lifecycles reduce time to market for new services Cloud and network automation capabilities can free up IT resources, raise customer satisfaction levels and support Worldline’s ability to expand services to more countries VMware, Inc. (NYSE:VMW), a global leader in cloud infrastructure and business mobility, today announced that Worldline, a European leader in the payments […]

Microsoft Announces Windows Defender ATP support for Windows 7 and Windows 8.1

Microsoft
With Windows 10 we built the most secure Windows ever, by hardening the platform itself and by developing Windows Defender Advanced Threat Protection (ATP) – a unified endpoint security platform that helps stop breaches. This means that for the first time we’ve built threat and exploit protection, and Endpoint Detection & Response right into the […]

World Backup Day 2018 data protection readiness reminder

Greg Schulz
World Backup Day 2018 Data Protection Readiness Reminder It’s that time of year again, World Backup Day 2018 Data Protection Readiness Reminder. In case you have forgotten, or were not aware, this coming Saturday March 31 is World Backup (and recovery day). The annual day is a to remember to make sure you are protecting […]

Cloud and Certification

Danny van Dam
The move to the cloud and cloud adoption will effect many working in IT, as an moderator on the TechNet forum for Education and Certification I see many questions on what certification to acquire to be ready for the demand on Cloud specialists.How should you invest your time and money to be ready for the […]

Top 10 Password Policies and Best Practices for System Administrators

Devolutions
We all know that a strong password policy is the front line of defense to protect our financial transactions, personal communications and private information stored online. For end-users, using a strong password at work is as important as it is at home, it is your own personal bodyguard defending you with everything he has against […]

Microsoft: Decentralized Digital Identities and Blockchain – The Future as We See It

Microsoft
Greetings everyone, I’m Ankur Patel from Microsoft’s Identity Division. It is an awesome privilege to have this opportunity to share some of our learnings and future directions based on our efforts to incubate Blockchain/distributed ledger based Decentralized Identities. What we see As many of you experience every day, the world is undergoing a global digital […]

Citrix: Meltdown and Spectre: Understanding the Performance Impact, Current State & What’s Next

Citrix Systems
Over the last couple of weeks, everyone in the IT industry has been keeping a close eye on a new class of security attacks that are taking advantage of a design flaw in modern computer processors. This is an industry-wide issue, not a problem specific to any operating system, hypervisor, or application. There are three […]

Visit Our Sponsors

Close