Skip to content
Thursday, November 20, 2025

Security Enterprise Cloud magazine

.

  • Cloud
  • Security

Advanced Persistent Threats (APT)

  • Trevor Kennedy
  • December 21, 2014
  • 1

One of the big themes of InfoSec 2013 was APT’s. A number of talks specifically targeted (excuse the pun) this topic. The perception is that […]

  • Security

How Secure is Your Password?

  • Trevor Kennedy
  • October 21, 2014
  • 0

There have been a lot of recent security breaches in cyber land, including LinkedIn, the FBI and more recently Yahoo. The Yahoo breach included over […]

  • Reviews
  • Security

Top Free Internet Security Tools

  • Joe Womberman
  • October 21, 2014
  • 0

Obviously the old adage, you get what you pay for is just as relevant on the Web as it is offline. However there are always […]

  • Security

Barbarians at the Password Gate

  • Joe Bright
  • August 30, 2014
  • 0

Why you should be worried about your passwords We’re now using the Internet for a wide range of everyday activities, including online banking, stock trading, […]

  • Technology

The Perfect Game of Snake!

  • Trevor Kennedy
  • August 4, 2014
  • 0

The following GIF is making the rounds, a perfect game of snake. It has been sped up to complete in just under three minutes. Some […]

  • Technology

The Top Eight Places You Are Playing Mobile Games (eewww)

  • Joe Womberman
  • June 6, 2014
  • 0

By the nature of being mobile, we are no longer confined to our living rooms or bedrooms to play games. EA Games in conjunction with […]

  • Security

FBI’s MOST WANTED – Chinese Generals!

  • Joe Womberman
  • May 19, 2014
  • 0

On the 1st May 2014 a United States grand jury in Pennsylvania indicted five Chinese military officials on 31 counts of cyber espionage. The five […]

  • Security

Consumer Oriented Two-Factor Authentication and the Challenges

  • Joe Bright
  • April 30, 2014
  • 0

After Facebook, Google, Microsoft and PayPal, Apple has started offering two-factor authentication to help its customers secure their Apple IDs against hacking. Initially, two-step verification […]

  • Technology

First Ever Website Rides Again!

  • Trevor Kennedy
  • April 30, 2014
  • 0

The first Web Address, with a Hyper Text Markup page was http://info.cern.ch. Hyper Text Markup Language, or HTML as it is now known, along with […]

  • Security

The Importance of Security Awareness Training

  • Steve Mambo
  • March 21, 2014
  • 0

Information security awareness training can be best defined as training conducted in an organization so that the staff can understand the importance of security within […]

Posts pagination

Previous 1 … 15 16 17 … 23 Next
Copyright © 2025 Security Enterprise Cloud magazine Theme: By .