Every culture and trade has its own secret language known only to the initiates, but in today’s post we’re going to look at 57 of the oddest/strangest/most obscure terms we use in what, to us, is everyday language.
Continue readingEvery culture and trade has its own secret language known only to the initiates, but in today’s post we’re going to look at 57 of the oddest/strangest/most obscure terms we use in what, to us, is everyday language.
Continue readingHappy Towel Day, fellow hitchhikers. And if you happen to be a strag*, we hope you have found your towel. ‘What is it with towels?’ you may ask. Fans of the ultra geeky, ultra absorbing The Hitchhiker’s Guide to the Galaxy will know that Douglas Adams had a few things to say on the subject […]
Continue readingInformation security pros abound on Twitter. While not all of their tweets may be 100% focused on InfoSec, we’ve picked 61 network security Twitter feeds we think are worth following.
Continue readingCombining web filtering with endpoint security makes sense for any company looking to deploy a layered defense and ensure that they are protecting their users, their customers and their corporate resources as thoroughly as they can.
Continue readingAs 2014 draws to a close, we wanted to take a look back at the top 26 news stories, developments, and trends in technology for the year.
Continue readingHackers known as the Guardians of Peace breached Sony Pictures Entertainment’s network, gaining unprecedented access to essentially everything. What are the lessons learned here?
Continue readingWhether you’re looking for a small gift to give your sysadmin at the office party, or a larger gift for the sysadmin who happens to be your loved one, we’ve got you covered with this year’s list of the top 24 gadgets for sysadmins.
Continue readingHackers are purportedly bundling malware onboard with USB chargers so that, when users connect them to their computers to charge their e-cigarettes, they get more than a nicotine hit.
Continue readingGFI Archiver 2015, a rebranded and updated version of GFI MailArchiver, is available today and we asked its product manager, Ian Bugeja, to tell us why the product has been rebranded and what’s new in this version.
Continue readingAccording to your bandwidth bills, a black hole is a region of the Internet from which cat videos, check-ins, and likes prevent anything, including productivity, from escaping. Let’s take a closer look at some of the black holes that threaten your users and data from cyberspace, and how you can protect your users from them.
Continue reading