666 Results for:E-MAIL

  • Sort by: 

Siemens issues software fix to protect against Stuxnet

By Warwick Ashford 25 Jul 2012

German engineering firm Siemens has issued a fix for the software vulnerabilities in its programmable logic controllers that were exploited by the computer virus Read More

Bernalillo County ransomware attack still felt weeks later

By Peyton Doyle 25 Jan 2022

A ransomware attack in early January disrupted government systems in New Mexico's largest county, which stalled operations at county offices and the county detention center. Read More

Buyer's Guide: How to prepare your organisation for IPv6

By Cliff Saran 14 Feb 2012

The switch to IPv6 – on 6 June – shows just how imminent the transition from IPv4 to IPv6 is. Is your organisation ready? Read More

What are the top secure data transmission methods?

30 Sep 2020

Safe information transfer is a must for modern organizations, but not all secure data transmission methods are equal. Explore your secure data transfer options in this tip. Read More

HONOR Watch GS Pro rugged smartwatch 

By Adrian Bridgwater 29 Oct 2020

Are you a so-called ‘urban adventurer’ at heart? That’s what Huawei sub-brand company Honor wants you to be with its latest smartwatch.  Actually, you could be an office-based user (oh okay, it’s ... Read More

Master Amazon CloudWatch metrics to track AWS use

By David Carty 28 Jul 2016

Amazon CloudWatch enables administrators to track resources using metrics and log files. Admins should get to know the terminology as well as ins and outs of the auditing service. Read More

Ethiopian government blocks Tor Network online anonymity

By Warwick Ashford 18 Jun 2012

The Ethiopian government is blocking access to the Tor Network that enables online anonymity, according to Reporters Without Borders Read More

How Singapore’s MyRepublic hones its IT chops

By Aaron Tan 13 Jul 2018

MyRepublic’s CIO shares how the company’s IT strategy has enabled the internet service provider to spread its wings into new markets Read More

Hey Siri: How does Apple MDM keep you from accessing corporate data?

By Kyle Johnson 13 Jun 2018

Digital assistants and access in the workplace are a constant struggle. How difficult is it for the enterprise to keep Siri under control on BYOD or COPE devices? Read More

Microsoft Teams lifecycle management with PowerShell and Graph

By Liam Cleary 10 Dec 2021

A rushed Microsoft Teams deployment could lead to unintended gaps in security and governance. Here's how to use PowerShell and the Microsoft Graph to regain control. Read More