Are your secrets safe?

March 31st, 2014|Categories: trend micro|Tags: , , , , , , , , , |

Inside the deep recesses of the Internet lie thousands of phone numbers, email addresses, banking details, and personal conversations—enough for cybercriminals to create a dossier for every active Internet user like you. This 2014, we [...]

Insight: IT Data for Compliance, Security and Forensics

February 24th, 2014|Categories: LogLogic|Tags: , , , , , , , , |

Loglogic's CEO Guy Churchward talks about how Loglogic's suite of products are the industry's pre-eminent forensic analysis tool and provides rapid search against a complete record of user and system activity. LogLogic is the IT [...]

USTA Chooses EdgeWave to Secure the US Open 2013 Network and Wi-Fi

December 20th, 2013|Categories: EdgeWave|Tags: , , , , , , , |

The US Open is one of the largest events in the world, with more than 720,000 media, athletes, partners, and fans in attendance. With nearly every individual carrying a laptop, tablet or smart phone, the [...]

Your password isn't '123456' is it? The importance of complex passwords

November 29th, 2013|Categories: EdgeWave|Tags: , , , , , , , , , |

Last month in early October, Adobe servers were breached and the passwords of 130 million active and inactive users (38 million active users) were seized by hackers. These passwords were posted online and it’s shocking [...]

LogLogic Customers: I Love Logs

November 21st, 2013|Categories: LogLogic|Tags: , , , , , , , , |

President and CEO Guy Churchward on why LogLogic loves logs. Loglogic's suite of products are the industry's pre-eminent forensic analysis tool and provides rapid search against a complete record of user and system activity. LogLogic [...]