Taming The Security Weakest Link(s)

Overview The security level of a computerized system is as good as the security level of its weakest links. If one part is secure and tightened properly and other parts are compromised, then your whole system is compromised, and the compromised ones become your weakest links. The weakest link fits well with attackers’ mindset which …

Continue reading

Should Google Lead the Web Development Tools Market?

Nik Cubrilovic on Techcrunch posted on recent innovation from Google Google Pages Released . Google as they always do now put their hands in authoring of webpages as well as in web hosting. (Maybe this move will make Adobe and Microsoft even closer friends:) Google as a leader in developing rapidly new web applications probably …

Continue reading