Those that have upgraded to the latest version of Microsoft's Web browser (Internet Explorer 11) are not at risk for attack.
Cloud storage providers' data retention policies and limited Internet access overseas could provide a headache for those with data not stored on site.
With many options for those looking to protect enterprise data, here are some of the top methods and why they may or may not be right for you.
- By Scott D. Lowe
Microsoft's monthly patch includes four 'critical' and three 'important' fixes that address a total of 32 vulnerabilities.
In a period of radical change in Redmond, don't be surprised to see Microsoft making moves (and partnering with rivals) in ways it never would have done in the past.
- By Mary Jo Foley
Instead of lamenting over the loss of the subscription service, Microsoft IT pros should focus on making software development easier in a post-TechNet world.
- By Greg Shields
Kaspersky Labs, the firm who disclosed the flaw to Adobe, said one of the vulnerabilities is being used to steal user credentials.
Along with the figures, Microsoft slams Obama's NSA surveillance reform plans for not going far enough to ensure transparency.
When evaluating current or possibly new staff members, look to see who utilize automation for repetitive time sinks.
Knowing exactly what in-memory OLTP tables are used for will help you make the most of one of SQL Server's newest features.
- By Denny Cherry
Brien walks you through how to repair a failed drive within a storage pool to quickly get you up and running after an error occurs.
If Microsoft wants its next OS to be a success, it should look to what made Windows XP so popular.
Wondering how manufacturers can continue to release larger storage drives every year? Here's some of the tech that makes it possible.
- By Scott D. Lowe
Here's how to determine which SharePoint version is right for individual machines and how to make sure they play nicely with different versions.
- By Spike Xavier
While malware moving from mobile devices to PCs have become the norm, malware moving in the opposite direction looks to be a new attacker trick.
Here's how to differentiate between OS virtual disks and virtual machine virtual disks.
Choosing the right fit for your organization comes down to balancing cost with performance.
Cisco found that 76 percent of all Web-based attacks were targeted at Java.
The hacker collective Syrian Electronic Army took credit for the hacks and posted fake messages warning that Microsoft is spying on users' e-mail accounts.
Besides using replicas as protective backups, they can be used for testing purposes.