Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Wednesday, April 14, 2010
Whaleback Launches Carrier Version of Crystal Blue Voice
Sponsored by IntelliTek IT managers need a proven, steadfast process for sifting through the hundreds of choices available for each enterprise software market segment. Whether you are evaluating CRM or RFID solutions, the same basic selection process applies. There are a series of steps for ensuring a result that will survive the intense, long-term scrutiny this level of investment will certainly attract. Download Now >>
The Republican National Committee is leveraging open source VoIP tech for its election-cycle polling and organizing efforts, but the final results aren't open to the public. Read more >>
A recent study by Symantec Corp. of IT professionals revealed that most companies have a long way to go to ensure that data placed in the cloud remains secure. The survey of some 637 senior-level IT professionals employed at businesses ranging... Read more >>
No comments:
Post a Comment