As seen in:

Our latest news and insights.

Fighting the Pox on Your Inbox

No mere nuisance, spam is engulfing corporate e-mail systems like a greedy swarm of locusts and blotting out legitimate business communications. Here’s how to ward off the plague. Lots of

Symantec Buys Spam Killer, Gets Street Cred

A year ago, Symantec was in the bush leagues of antispam vendors. The company, as part of its mail security software package, offered only a basic spam-blocking feature that guessed

An Extra Measure of Security

M. Angela Sasse, a professor at University College London who specializes in security, recommends top-to-bottom training in an information-technology department—and higher in the organization. “There has been a tendency to

Users Gush over MailFrontier’s Anti-Spam

Here’s a measure of how much people like MailFrontier’s antispam software: Even a customer who says the company misrepresented the terms of its deal with him raves about its product.

Cloudmark: Vapor Customers

Cloudmark claims its software is used at more than 2,000 companies. But the startup may be embroidering the truth: Several of the “corporate customers” touted by Cloudmark do not have

Primer: Free Space Optics

What is it? Free space optics technology is wireless networking that uses light beams instead of radio waves; it’s laser-based optical networking without the fiber optic cable. In corporate networks,

Outsourcing: What Ratio Is Right?

What a company purchases from suppliers of goods or services defines the amount that firm outsources. Innovations in global commerce have lowered the costs and expanded the reach of purchasing

Shadowcrew: Web Mobs

They operate under names such as carderplanet, stealthdivision, darkprofits and the shadowcrew. They buy and sell millions of credit card numbers, social security numbers and identification documents, typically for less

Sunny Delight: Cutting Ties

Greg Winholt, chief information officer and controller of fruit beverage maker Sunny Delight, glances at his watch; time is precious. A steady stream of heads poke into his office to

Base Technologies 5

It doesn’t take much to get an organized cybercrime ring going. Below is a list of technologies that the U.S. Secret Service and security experts say have been used by

Baseline is an independent publication focused on the intersection of business and technology.

Our editors at Baseline work tirelessly to provide our readers with the most relevant and recent business technology information. We work with influencers and industry experts to help you implement technology into your business. 

Every technology solution we recommend has been vetted by our technology.

To maintain objectivity, we don’t accept sponsorships or commissions for promoting specific tech products or free services in exchange for favorable reviews. We provide unbiased opinions and expert insights to inform our audience.

We don't overlook long-term technology trends.

Your technology strategy should serve your business for years to come, which involves ongoing costs and updates. That’s why we don’t just focus on initial implementations. Instead, we gather first-hand data on the long-term expenses associated with maintenance fees, scalability requirements, and potential upgrade costs you can expect.

We are constantly getting better day by day.

We are committed to providing honest assessments – especially if a solution fails to meet expectations. Our publication is an independent technology resource that doesn’t accept payment for positive reviews.

We will tell you when a software isn't what it seems.

We continuously seek ways to enhance our analysis, from developing new benchmarks for software performance to upgrading our software assessment tools. If you’d like to suggest technology solutions or strategies we should evaluate or have any feedback for us, please reach out or join our online forum.