• Commercial software more secure than open source, finds report

    A study has found that commercial code is more compliant than open source code with security compliance standards, such as the Owasp top 10 and the CWE top 25

    WAshford3,385 pointsBadges:
  • Continuous improvement process important for BC/DR

    A process for continuous improvement of BC/DR operational and administrative activities is an important aspect of a business continuity management system.

    PKirvan1,145 pointsBadges:
  • software RAID (software redundant array of independent disk)

    Software RAID is a form of RAID (redundant array of independent disks) performed on the internal server.

    Margaret Rouse7,785 pointsBadges:
  • Getting started with Microsoft Azure Backup

    Microsoft Azure Backup, which automatically sends encrypted backups to the cloud, is easy to set up. But is it cost-effective for large enterprises?

    JonHassell1,295 pointsBadges:
  • How to buy an all-flash storage array

    A solid request for purchase is key for any storage purchase. But, an all-flash array RFP requires additional info you may not have included previously.

    info11180 pointsBadges:
  • Tor anonymity called into question as alternative browser surfaces

    News roundup: New threats add to the Tor anonymity debate as a new browser aims to take anonymous browsing to the next level. Plus: Android security outlook bad -- or is it?; another Xen host escape flaw; Wassenaar revisions put on hold.

    SharonShea470 pointsBadges:
  • How to estimate the lifespan of LTO tapes

    This tip outlines what you need to consider when estimating the lifespan of LTO tape. It's not as black and white as LTO tape manufacturers would like you to believe.

    searchStorage9,330 pointsBadges:
  • Best of VMworld 2015 Awards: Nomination form

    Nominate the top virtualization, cloud and end-user computing products for the 2015 Best of VMworld Awards.

    Nick Martin865 pointsBadges:
  • Google pledges security training for 10,000 UK internet users

    Google will host free workshops in five UK cities and 30 schools on safeguarding passwords, updating account settings, finding stolen devices and checking where data is being shared

    WAshford3,385 pointsBadges:
  • VPN security: testing, troubleshooting and deploying

    In this section of our network access learning guide, learn how to test VPN security, troubleshoot VPN flaws and vulnerabilities as well as learn about VPN alternatives.

    ITKE364,180 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.