News

SPEAR PHISHING What is device code phishing, and why are Russian spies so successful at it? Overlooked attack method has been used since last August in a rash of account takeovers.
Titled, "High Availability for SQL in VMware without Raw Device Mapping," this webinar will be held on Thursday, May 19 at 10:00 AM PDT / 1:00 PM EDT. To register, please visit here.
Sophos and SonicWall have alerted users of critical security flaws in Sophos Firewall and Secure Mobile Access (SMA) 100 ...