Please turn on your JavaScript for this page to function normally.
10 steps to ensure users only access what they need

Every organization faces one challenge to their IT security position – the user. It doesn’t matter how much security training and advice a person is given – …

NIST updates guide for dealing with computer security incidents

The National Institute of Standards and Technology (NIST) has published the final version of its guide for managing computer security incidents. Based on best practices from …

Performance tuning Windows Server 2012

Microsoft released a comprehensive paper that describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the …

Burning enterprise authentication issues

Threats keep evolving and are becoming more invasive, targets now go beyond the financial industry and involve any company that has sensitive information – whether its …

Application recovery challenges and how to address them

In response to such trends as growth of mission-critical data, the proliferation of virtualization and cloud within the data center, and the erosion of organizational …

Modern day pirates

Many of you will remember long summer days with the streets filled with laughing children congregating to play football or just hang out with their friends – I certainly …

Overcoming the hacker hurdle during the Olympics

During the Beijing Olympics it’s reported there were upwards of 12 million “cyber security incidents” per day . Hacking has evolved tremendously since …

Five steps for a secure cloud transition

Almost every type of SMB is examining its current IT infrastructure, determining what data and processes can move to the cloud. Of course, security remains one of the biggest …

The dangers of Java and what to do about it

Since late 2010, Java exploits have become way more popular with hackers than the Adobe-related ones. The problem with Java is not so much in the newly discovered …

One in ten SMEs have suffered a data hack

One in ten small businesses in the UK have experienced a data hack. Hiscox research also revealed that 90% don’t have a cyber crime insurance policy in place to protect …

Software security guidance for Agile practitioners

SAFECode released a paper that provides practical software security guidance to Agile practitioners in the form of security-focused stories and security tasks they can easily …

IPv6 and click fraud

The good news: To accommodate the ever-increasing demand for IP Addresses around the world, every network will eventually transition to IPv6 from IPv4. The bad news: Spammers …

Don't miss

Cybersecurity news