With all of the data breaches making headlines today - like the Canada Revenue Agency's loss of 900 Social Insurance Numbers due to Heartbleed this week - it's becoming clearer than ever that businesses and organizations need to closely guard their data. One of the easiest ways to do that?
It's hard to say what's the most ubiquitous wireless technology we use every day: Almost everyone carries a cell phone; Bluetooth is available for everything from earpieces to speakers; and Wi-Fi is found in the enterprise, stores, airports and homes. So it's no surprise that wireless technologies are constantly advancing. Take 802.11ac,
The management of unified communications (UC) systems is already a big enough task for network managers. It's complicated and unglamorous, and it's getting tougher all the time as network devices and complexity proliferate. That's what Zeus Kerravala, principal analyst of network management consultancy ZK Research, concluded after taking in the recent
With the Heartbleed vulnerability on people's minds we thought it a good time to revisit the CWE/SANS Institute's advice for eliminating or reducing the severity of the leading mistakes developers make when creating software. Follow these tips and your code will be more secure. For more detail click here. All