Firefox

The Mozilla Foundation's Firefox Web browser, now in release 3.x, has cut into what had been Microsoft Internet Explorer's near-monopoly in the Web browser market. Firefox first gained a following because of well-publicized security flaws in IE and Firefox usability features, such as tabbed browsing, that have become standard in most browsers. Firefox is distributed as freeware, and is supported in part by revenues from Google, the browser's default home page. Smart shops test their applications in Firefox for compatibility.


Articles

The New Face of Data Security Professionals: Women

A new report states that women possess the communication skills and diverse academic backgrounds needed to bolster security performance in the enterprise. More >

Phone Fraud on the Rise: Report

Pindrop Security claims that call centers are losing $0.57 per call due to fraud. More >

IPv6 Presents Opportunities and Risks

IPv6 promises improved network performance and better Internet accessibility, but many security experts say the standard also creates new dangers. More >

More Articles >

Interviews

Making VDI More Secure

Don't ignore these potentially serious vulnerabilities.

More >

Data at Home and in the Cloud

Cloud means that an enterprise must trust a service provider to provide controls at a physical and infrastructure layer, but logical controls can remain the same.

More >

Security Staffs: BYOD Is Here to Stay, Deal with It Proactively

The emergence of BYOD is perhaps the most important trend in IT management of the past decade. AlgoSec CTO Avishai Wool said that IT’s first step toward security in this challenge environment is proactively accepting that the changes are here to stay. He told IT Business Edge blogger Carl Weinschenk that current and future technology will make BYOD a safe way to do business — if they are utilized.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

Nine Questions to Ask When Selecting a Security Vendor

Security Staffing

You need it. They claim to have it. What questions should you be asking as you hunt for the "just right" vendor to help you defend against the most sophisticated and determined adversaries? 

 More >

Money Management Tools Help SMBs Predict Cash Flow

Why Higher Education Is Desperate for McAfee’s Comprehensive Security Approach

Cloud and Disaster Recovery/Business Continuity: A Perfect Fit

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

IT_Man16-190x128 Managing Risk and Security in Outsourcing IT Services

The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including securi...

Security5TN A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification

This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings...

Security04 Framework for Improving Critical Infrastructure Cybersecurity

The Framework enables organizations – regardless of size, degree of cybersecurity risk, or cybersecurity sophisticat...

Security12-290x195 Guide to Attribute Based Access Control (ABAC) Definition and Considerations

This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical acce...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.