-
Creating an application network highway to the cloud
Cloud environments are now a cornerstone of the infrastructure required to deliver the applications critical to digital experiences. IDC reports that…
-
corporate Twitter accounts: protect your image!
No, President Barack Obama is not dead and there was no attack in New York. Protecting a company's twitter account has become essential as in case of…
-
ISO 27001 certification doesn't guarantee security
A lot of people think an ISO 27001 certified service is completely secure. In my opinion, that's not entirely true. I'm not trying to criticize this…
-
surf anonymously on your iPhone or Android phone using Tor
You can now browse the Web anonymously on your smartphone.
-
choosing an email address for security incidents
All organizations are susceptible to potential IT attacks. Email is the most common method used for contacting the team in charge of handling…
-
businesses sending spam: fact or fiction?
While everyone knows about “incoming” spam, spam sent by company networks suffers from a serious lack of communication. Sometimes it’s even a taboo…
-
cloud computing: a challenge for intrusion prevention systems
Intrusion detection and prevention systems can be difficult to implement and administer.
-
Is your IT vendor transparent on carbon emissions?
Assessing environmental impact to meet the Corporate Sustainability Reporting Directive (CSRD)
-
"Green IT", or "IT for Green"?
Three years ago, the "Green IT" concept emerged as a way to talk about the positive impact that IT could have on the environment. Breakthroughs such…
Sort by :
9 results for
François Rall :
Blog post (9)