666 Results for:E-MAIL
- Sort by:
Siemens issues software fix to protect against Stuxnet
25 Jul 2012German engineering firm Siemens has issued a fix for the software vulnerabilities in its programmable logic controllers that were exploited by the computer virus Read More
Bernalillo County ransomware attack still felt weeks later
25 Jan 2022A ransomware attack in early January disrupted government systems in New Mexico's largest county, which stalled operations at county offices and the county detention center. Read More
Buyer's Guide: How to prepare your organisation for IPv6
14 Feb 2012The switch to IPv6 – on 6 June – shows just how imminent the transition from IPv4 to IPv6 is. Is your organisation ready? Read More
What are the top secure data transmission methods?
30 Sep 2020Safe information transfer is a must for modern organizations, but not all secure data transmission methods are equal. Explore your secure data transfer options in this tip. Read More
HONOR Watch GS Pro rugged smartwatch
29 Oct 2020Are you a so-called ‘urban adventurer’ at heart? That’s what Huawei sub-brand company Honor wants you to be with its latest smartwatch. Actually, you could be an office-based user (oh okay, it’s ... Read More
Master Amazon CloudWatch metrics to track AWS use
28 Jul 2016Amazon CloudWatch enables administrators to track resources using metrics and log files. Admins should get to know the terminology as well as ins and outs of the auditing service. Read More
Ethiopian government blocks Tor Network online anonymity
18 Jun 2012The Ethiopian government is blocking access to the Tor Network that enables online anonymity, according to Reporters Without Borders Read More
How Singapore’s MyRepublic hones its IT chops
13 Jul 2018MyRepublic’s CIO shares how the company’s IT strategy has enabled the internet service provider to spread its wings into new markets Read More
Hey Siri: How does Apple MDM keep you from accessing corporate data?
13 Jun 2018Digital assistants and access in the workplace are a constant struggle. How difficult is it for the enterprise to keep Siri under control on BYOD or COPE devices? Read More
Microsoft Teams lifecycle management with PowerShell and Graph
10 Dec 2021A rushed Microsoft Teams deployment could lead to unintended gaps in security and governance. Here's how to use PowerShell and the Microsoft Graph to regain control. Read More