-
APT: a threat of the third kind
APT: three letters that have struck fear into the hearts of many IT security managers around the world these past few months.APT stands for "Advanced…
-
IPv6 security: a new playing field
-
DDoS attacks over spam
In early May 2011, the Czech Republic hosted the "Security and Protection of Information" conference, featuring an opening speech on "Denial-of…
-
a look at the hidden part of the logs
Managing logs within an IT infrastructure is, above all, strongly tied to our...
-
how do you evaluate a password's strength?
Whether you are a project manager, IT manager, head of a development project, or in charge of any other activity involving direct user contact, you…
-
ten tools for securing your work station
Among IT security goals, three topics are particularly important to users: data integrity (non-alteration of data), confidentiality (authorization…
-
in search of... lost smartphones
What happens when a smartphone without a security system is left in the middle of an urban jungle? Experts from Symantec have tried to answer this…
-
Outsourcing barn dance continues, but chose your partner carefully
The utsourcing barn dance continues, but chose your partner carefully.
Sort by :
8 results for
Vincent Maurin :
Blog post (8)