MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
April 3, 2002
Laura Rohde
Are Web Sites as Secure as They Seem? Study finds that popular encryption technology isn't always enough -- and surfers may be unaware of the danger... mark for My Articles similar articles
InternetNews
July 29, 2010
Researcher Warns Most Sites Get SSL Wrong At Black Hat, security researcher presents his latest work demonstrating the widespread misconfiguration of websites that implement SSL protection. mark for My Articles similar articles
InternetNews
May 6, 2005
Erin Joyce
Bob Weinschenk, CEO, Britestream And here's the pitch: The time has come for offloading online security from the software side to the hardware side of the network. mark for My Articles similar articles
Fast Company
Chris Gayomali
All Your Most Pressing Heartbleed Questions Answered Heartbleed is the devastating two-year-old bug that was only revealed Monday. It is quickly snowballing into the single biggest security vulnerability in Internet history. Here's what you need to know about it mark for My Articles similar articles
InternetNews
July 21, 2010
VeriSign to Add Malware Scanning to SSL Scanning service is designed to enhance the security of SSL certificates. mark for My Articles similar articles
InternetNews
June 17, 2010
VeriSign Corners SSL Certification The latest market share figures from Netcraft show VeriSign's made significant gains. But the report also shows why the SSL market is hard to quantify. mark for My Articles similar articles
PC World
October 2003
Scott Spanbauer
Can You Pass the PC World Password Safety Test? Password rules and tools; clear your passwords; cache news to read offline; update your media players. mark for My Articles similar articles
Wall Street & Technology
November 6, 2006
Cory Levine
Slacking on Security Information security solution vendor Cyber-Ark reports that passwords with administrator-level permissions are too common at most firms, creating security loopholes. mark for My Articles similar articles
InternetNews
January 12, 2011
Hacker to Expose Wi-Fi Flaw Using Amazon EC2 At next week's Black Hat conference, a security expert reportedly plans to divulge method for breaking wireless networking passwords through brute force attack. mark for My Articles similar articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles similar articles
Popular Mechanics
February 2007
Joel Johnson
Secure Sockets Layer Explained: Tech Clinic What Secure Sockets Layer (SSL) is and how it works to secure Internet transactions. mark for My Articles similar articles
The Motley Fool
February 5, 2008
Tim Beyers
A Valentine for Secure Computing Secure Computing is a misunderstood stock, beating Wall Street estimates although the Street says otherwise. Investors, read on to see why. mark for My Articles similar articles
The Motley Fool
February 28, 2007
Mary Dalrymple
They've Got Your Number How to safeguard your Social Security number. mark for My Articles similar articles
PC Magazine
February 5, 2009
Joel Santo Domingo
Lenovo ThinkPad USB Portable Secure Drive If you need to keep your data secure and portable, the Lenovo ThinkPad USB Portable Secure Drive is a simple-to-use option. mark for My Articles similar articles
PC Magazine
July 13, 2004
Servers and Storage for Small Business Just about every small business can benefit from having its own servers and dedicated storage for those servers. But deciding what to buy can be a challenge. The key is to assess your needs accurately. mark for My Articles similar articles
New Architect
May 2002
Logan G. Harbaugh
SSL Accelerators To increase a Web site's ability to handle SSL transactions, as well as to reduce processor overhead, it makes sense to offload SSL processing from the server to dedicated hardware... mark for My Articles similar articles
InternetNews
June 28, 2010
Millions of SSL Certificates Invalid: Study Are widely-used SSL security certificates being configured correctly? mark for My Articles similar articles
InternetNews
April 4, 2008
Judy Mottl
HP Targets Storage With New Security Tools HP expands Secure Advantage Portfolio with new tools and free service. mark for My Articles similar articles
The Motley Fool
July 31, 2007
Tim Beyers
Don't Be Deceived by These Numbers If ever a rule of thumb were made to be broken, it's this: Never invest in an unprofitable company. Here's a look at network security specialist Secure Computing. mark for My Articles similar articles
T.H.E. Journal
November 2004
DMU Develops Protocol to Fight Net Abuse Des Moines University is working on a new Internet communications protocol called the Iowa Internet Annoyance Logging Protocol (IIALP), which allows end users and system administrators to track abusive Internet activity. mark for My Articles similar articles
AskMen.com
Jasper Anson
Business Tech Jargon Even if you're not planning for a career in the tech industry, it still helps to have an informed idea of what's going on in the ever-changing world of tech speak. mark for My Articles similar articles
Managed Care
August 2007
E-mailing Doctors Desirable for Those with Comorbidities Patients who have multiple comorbidities and who take multiple medications may benefit most from a secure e-mail messaging system, according to a study. mark for My Articles similar articles
InternetNews
December 30, 2008
Richard Adhikari
Certificate Flaw May Threaten Secure Web Sites Researchers say they've found a weakness in a common cryptography technology used in the digital certificates that protect many secure online transactions. mark for My Articles similar articles
PC World
August 19, 2002
John Fontana
Debate Flares Over Microsoft's SSL Glitch Software giant says flaw would be difficult to exploit, but some security experts disagree. mark for My Articles similar articles
InternetNews
October 11, 2004
Ryan Naraine
Web Servers, BIND Top 2004 Vulnerabilities List The SANS institute breaks down the top 10 vulnerabilities in Windows and Unix systems. mark for My Articles similar articles
CRM
March 25, 2015
Good Technology Adds Data Security to Microsoft Dynamics CRM New version provides app-level security on corporate-owned or personal iPads. mark for My Articles similar articles
Investment Advisor
October 2010
Dan Skiles
Server Rack -- Don't Forget Physical Security Make sure that your server is secure enough that someone can't walk in and carry it out without much work. mark for My Articles similar articles