Please turn on your JavaScript for this page to function normally.
Botox And IT Security – Is It Too Late For You?

As a fifty something male, personal grooming takes on whole new meaning. You realize that when you start typing “Botox” on Google that things are getting serious. …

PCI Data Security Standard Calls for Next-Generation Network Security

The widespread use of credit cards for virtually all of our financial transactions has increased exponentially with the rapid adoption of e-commerce throughout the worldwide …

The Truth About Patching

As arguments continue to rage about whether an agent-based or agentless patching technique is more effective, see which side you’re on after we dispel five common myths. …

Introduction to the Windows Management Instrumentation Command-line (WMIC)

It’s quite possible you’ve never heard of the Windows Management Instrumentation Command-line (WMIC), but this well kept secret command-line tool is immensely …

E-Mail Content Security: Filtering Out the Hype

E-mail is at risk – vulnerable to external attack from viruses, spam, spyware and phishing technologies. And vulnerable to abuse from within, which could result in: …

Introducing Stealth Malware Taxonomy

At the beginning of this year, at Black Hat Federal Conference, I proposed a simple taxonomy that could be used to classify stealth malware according to how it interacts with …

What Are The Most Common Causes Of Security Breaches?

Historically, the approach to enterprise security has been to make the fortress bigger and stronger – to install more products, and write more policies. Yet despite …

7 Steps to Securing USB Drives

Personal storage devices such as USB flash drives are more powerful than ever and have become ubiquitous in the enterprise environment. Originally designed for consumer use, …

Storing and Protecting Data

Given massive data growth across all industries, Information Lifecycle Management or ILM has become accepted as a critical business goal many organisations hope to achieve …

Top 10 Ajax Security Holes and Driving Factors

One of the central ingredients of Web 2.0 applications is Ajax encompassed by JavaScripts. This phase of evolution has transformed the Web into a superplatform. Not …

WAN Acceleration: Best Practices for Preserving Security

The centralization of branch office servers and storage enables enterprises to more effectively manage and secure critical business information. By moving servers out of …

Super Power Password Protection – Watching You Watching Me

Not a day goes by without some story hitting the wires about yet another piece of confidential information appearing in somebody’s inbox. Confidential emails, files, …

Don't miss

Cybersecurity news