News

Here's a law-enforcement checklist for investigating unauthorized access to a computer system.
Some options aren't optional.When it comes to a computer, there are steps any semi-sane person should take before ever hitting the on/off button.
According to a Forrester Research estimate, there are more than two billion PCs out there in the world. Although your average mobile device is definitely a more popular product today, more than ...
When you're packing for a trip -- business or pleasure -- and you want to take along a computer, make sure you take everything you're going to need. Here's a checklist that can serve as a starting ...
Information Technology administrator? Communicating the value of computer security best practices to your end users isn’t always easy. To help end users better understand the value of safety ...
This checklist is a companion piece to the primer, Locking down Web applications, part of SearchSecurity.com's Intrusion Defense School lesson on Web attack defense and prevention. Trying to ...
Thinking cloud database migration? Use this checklist to migrate your database to the cloud to avoid any issues such as security, latency, or integration.