Смотрите также связанные темы 29.07.2018 Новости компании Agnitum (июль 2008)
04.06.2018 Kerio Executive to Lead Mobile Email Session at Microsoft Tech-Ed North America 2008 IT Professionals Conference SAN JOSE, CA--(Marketwire - June 4, 2008) - Kerio Technologies, Inc., a provider of award-winning internet security and messaging software, today announced it will lead a Birds-of-a-Feather session at Tech-Ed North America 2008 IT Professionals Conference. Attendees will learn how to have a collaboration-centric enterprise infrastructure that has the freedom to choose virtually any email and calendar application and be able to synchronize data throughout the organization.
WHAT: Birds-of-a-Feather (BOF) Session titled, "Extending the Desktop to Mobile Devices Anytime, Anywhere"
WHO: Chris Pel...
09.12.2018 Kaspersky Security Bulletin 2015. Развитие угроз в 2015 году Традиционно конец года – это время для размышлений, время для переосмысления жизни и мыслей о будущем. Мы бы хотели предложить наш обычный обзор основных событий, которые формировали ландшафт информационных угроз в 2015 г.
10.09.2018 The Change Campaign Moves into Boston: Notes from Forrester Security Forum Amid the second week of the U.S. political conventions (and just ahead of Hurricane Hannah), Forrester Research held its Security Forum 2008 conference in “The Cradle of Liberty.” While both the Democratic and Republican tickets try to lay claim to the title of “Most Likely to Implement Change” in Washington, it was clear that Forrester [...]
04.09.2018 2008-09-03 - [slackware-security] php (SSA:2008-247-01) -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1[slackware-security] php (SSA:2008-247-01)New php packages are available for Slackware 10.2 and 11.0 to fix securityissues. These releases are the last to contain PHP 4.4.x, which was upgradedto version 4.4.9 to fix PCRE issues and other bugs.Please note that this is the FINAL release of PHP4, and it has already passedthe announced end-of-life. Sites should seriously consider migrating to PHP5rather than upgrading to php-4.4.9.Here are the details from the Slackware 11.0 ChangeLog:+------------------------...
21.10.2018 The First Security Innovation Alliance Developer Conference McAfee hosted its first Security Innovation Alliance (SIA) Developer Conference today at the MGM Grand in Las Vegas, in conjunction with FOCUS 08, to help expand our partners understanding of the tools and processes that comprise the heart and soul of the SIA. Though our program is barely a year old, we’ve made some [...]
05.11.2018 Introducing the Third Generation of NAC OK, you have spent a lot to secure your endpoints, but is your investment going to waste?
IT organizations large and small have invested heavily in endpoint security to address the rapidly evolving security challenge. AntiVirus, AntiSpam, Firewall, Host Intrusion Prevention, Compliance Auditing and more have been deployed to protect and assess endpoints. Much has [...]
16.12.2018 The Hidden Cost of Data Protection Companies today realize the threats and consequences of data loss, and by now most have some sort of data protection in place. But businesses that rushed into data protection for fear of losing precious information may have been too quick to throw together a patchwork quilt of security software that is now proving costly.
In the [...]
18.12.2018 "Лаборатория Касперского" выпустила бету новой линейки корпоративных продуктов В линейке Kaspersky Open Space Security представлены Антивирус Касперского для Windows Workstations 8.0, Kaspersky Administration Kit 8.0, Антивирус Касперского для Windows Server 8.0 и Антивирус Касперского Second Opinion Solution 8.0. Далее
09.01.2018 Рейтинг вредоносных программ, декабрь 2008 По итогам работы Kaspersky Security Network (KSN) в декабре 2008 года были сформированы две вирусные двадцатки. Первая таблица рейтинга формируется на основе данных, собранных в ходе работы антивирусного продукта версии 2009. В этой таблице зафиксированы те вредоносные, рекламные и потенциально опасные программы, которые были детектированы на компьютерах пользователей. Вторая таблица рейтинга представляет данные о том, какими вредоносными программами чаще всего заражены обнаруженные на компьютерах пользователей инфицированные объекты. В основном сюда попадают различные вредоносные программы, с...
|