Virtualization can expose data and encryption keys to hackers. Microsoft's shielded virtual machines and Host Guardian Service locks them down.
Jonathan Hassell |
10 Nov |
Read more
Yes, it's possible to do a Microsoft Exchange Server deployment that is secure enough for all but the most sensitive information. Here's how to do it.
Jonathan Hassell |
02 Nov |
Read more
Looking for a solution to keep company data out of the wrong hands? Windows 10's WIP might be the best option. Here's how WIP works.
Jonathan Hassell |
25 Oct |
Read more
When their data has been stolen, and is being held hostage, companies are increasingly caving in to cybercriminal demands for payment. Short of paying up, the best defense is a good offense.
Jonathan Hassell |
21 Apr |
Read more
Bitcoin exploded on to the world’s stage in 2012 as a currency backed by everyone and controlled by no one. But what exactly makes it work from a technology standpoint?
Jonathan Hassell |
14 Apr |
Read more
The Internet of Things brings with it the promise gee-whiz applications and life-changing innovation. But one thing’s for sure – there are as many questions as there will be gigabytes of data being poured into your data centers.
Jonathan Hassell |
29 Sep |
Read more
Cyberattacks threaten all of us. White House officials confirmed in March 2014 that federal agents told more than 3,000 U.S. companies that their IT deployments had been hacked, according to The Washington Post. Meanwhile, Bloomberg reports that the Securities and Exchange Commission (SEC) is looking into the constant threats of cyberattacks against stock exchanges, brokerages and other Wall Street firms.
Jonathan Hassell |
30 Apr |
Read more
Retail giant Target made headlines after announcing that 110 million Americans were affected by a massive data breach at its stores. If you want to avoid the same fate, pay attention to these four lessons learned in the wake of the Target breach.
Jonathan Hassell |
17 Mar |
Read more
Revelations that the United States government is monitoring Internet data from tech giants such as Facebook, Google and Microsoft should make your company reconsider where and how it stores data--all while realising that, at the end of the day, surveillance practices (usually) stay a secret for a reason.
Jonathan Hassell |
06 Aug |
Read more
Distributed Denial of Service events and other cyber-attacks are an unfortunate inevitability of doing business on the Web today. The four steps presented here will help your company prepare for and respond to a DDoS attack.
Jonathan Hassell |
14 Jan |
Read more