Web browser or Office suite? Microsoft's and Google's office productivity and collaboration clouds pit rich and complex against simple and lean more
This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to confront these advanced threats before, during and after attacks.
2009 Bossie Slideshows: Best open source developer toolsBest open source enterprise softwareBest open source networking softwareBest open source platforms and middleware
Read the full report: Best of Open Source Software Awards 2009
Read about the all-time Bossies:The greatest open source software of all timeTop 10 Open Source Hall of Famers
Find out what will be news for the day, with our first-thing-in-the-morning briefing.