Search in:

Law

BYOD and working hours

BYOD and working hours

Every day an article about BYOD is posted. More or less the topic is always the same: “BYOD and companies security plans“, “BYOD and internal security”, “BYOD, to do or […]

Workstation in disaster recovery site

 “No I didn’t. Honest… I ran out of gas! I–I had a flat tire! I didn’t have enough money for cab fare! My tux didn’t come back from the cleaners! […]

Heartbleed’ Bug: to blead or not to (still) bleed

More than a couple of months ago, all security an network engineers, has been involved with the Heartbleed’ Bug. A huge number of applications and appliances was affected by this bug. […]

Big data: with great power comes great responsibility

White House Big Data Report Uncle Ben is a sort of icon for all of Spiderman’s fans and his famous sentence, as well. Reading this post my mind has jumped […]

eBay stolen database and Bitcoin

So, as far as eBay denies the authenticity of a stolen database, another problem is arising quite quickly: BitCoin security usage. Apart from a couple of security issues (two months […]