[WEBINAR] The New Normal: Dealing with the Reality of an Unsecure World

Fred Donovan

Recent Articles by Fred Donovan

Big Data: How It's Captured, Crunched and Used to Make Business Decisions

Finding ways to turn the flood of data into useful information for business decisions is a growing challenge to the IT profession and C-level executives.

Whaling: Phishers Look to Land a Big Catch

Spear phishers are baiting their hooks for "big phish" with access to highly valuable corporate information, a strategy known as whaling.

Advanced Persistent Threats: First Salvo in the Coming Cyberwar?

These threats come from attackers with substantial means, backing and motivation to inflict major damage.

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
"Techopedia" on Twitter

Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Free Whitepaper: The Path to Hybrid Cloud
Free Whitepaper: The Path to Hybrid Cloud:
The Path to Hybrid Cloud: Intelligent Bursting To Amazon Web Services & Microsoft Azure
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.


  • E-mail is not a threat. (Postal mail) is universal. The Internet is not.
    - USPS spokesperson Susan Brennan, in a 2001 Wired article.