New Zero-Day Vulnerability for Internet Explorer

Today, Microsoft announced a new Security Advisory affecting Internet Explorer. Security Advisory 2458511 affects all supported versions of Internet Explorer. Navigating to a malicious website could lead to remote code execution. The reported attacks for this vulnerability have been limited to date. In fact, the known websites hosting the exploit have been taken down. There [...]

Read full story Comments { 0 }

ISO 27001 Annex A Controls

Annex A of ISO 27001 is probably the most mentioned annex of any management standard. Why is there so much talk about it? Why is it sometimes controversial? If you have read the Annex A, you have seen that 133 security controls are listed there. If that is the case, what is the main part [...]

Read full story Comments { 0 }

The Potential of Memcached Hosting – Part 1

Memcached Hosting Gets Recognition Technology has always evolved rapidly. The ongoing pursuit of faster speeds, portability, and effective cost management has resulted in several variations of web hosting plans designed to improve application processing and content delivery. The narrowing gap between premium service providers and open source communities has led to an array of new [...]

Read full story Comments { 0 }

Smartphone Euphoria Enterprise

The carrier ads describing the behavioral changes in western civilization to adapt to the Smartphone are actually realistic, even if they seem surreal. Addiction is the first word that comes to mind when I see the way younger generations are absolutely locked into their touch screens and the many apps available. Though I’ve only recently [...]

Read full story Comments { 0 }

How to Deal with BCM Sceptics?

Have you ever heard something like “It can’t be done”, “It has no use”, or “It’s useless if a major disaster occurs”? If you implemented business continuity management, you probably did. Naturally, such an attitude would not help your project, so here are some suggestions how to handle such people. “If a major disaster occurs, [...]

Read full story Comments { 0 }

Cable and Telecom Futures: Got Pipe?

More than twenty years ago, the cutting edge of technology was selling the future of TV and the phone lines. The big attraction then was being able to see each other’s lovely face while talking. None of us believed cable would have made it into the nineties, no less where it is today. It’s been [...]

Read full story Comments { 0 }

ISO 27001 Implementation Checklist

If you are starting to implement ISO 27001, you are probably looking for an easy way to implement it. Let me disappoint you: there is no easy way to do it. However, I’ll try to make your job easier – here is the list of sixteen steps you have to go through if you want [...]

Read full story Comments { 0 }

Six Tips for SMEs

IT system downtime puts small and midsize businesses at high risk, but relying on native or tape backup as a cost-saving measure can leave gaps in the continuity plan. The key to getting back on track quickly is an affordable, reliable disaster recovery plan that provides fast access to a current copy of data. Here [...]

Read full story Comments { 0 } Download Whitepaper

Protecting SharePoint

You rely on SharePoint Server to manage content, pages and email – but what if something happens to the server? Double-Take Availability provides high availability and disaster recovery for SharePoint Server, ensuring your users always have access to content. Download Whitepaper

Read full story Comments { 0 } Download Whitepaper

Is Cloud Computing More Energy Efficient than On-Premise Data Centers?

This blog is based on the cloud computing panel session at the third annual SVLG Data Center Energy Summit. The panel was moderated by Teresa Tung of Accenture, with Jon Koomey of Stanford and LBNL and James Staten of Forrester. From left: James Staten, Jon Koomey, and Teresa Tung First, let’s define what they were [...]

Read full story Comments { 0 }