10 steps to ensure users only access what they need
Every organization faces one challenge to their IT security position – the user. It doesn’t matter how much security training and advice a person is given – …
NIST updates guide for dealing with computer security incidents
The National Institute of Standards and Technology (NIST) has published the final version of its guide for managing computer security incidents. Based on best practices from …
Performance tuning Windows Server 2012
Microsoft released a comprehensive paper that describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the …
Burning enterprise authentication issues
Threats keep evolving and are becoming more invasive, targets now go beyond the financial industry and involve any company that has sensitive information – whether its …
Application recovery challenges and how to address them
In response to such trends as growth of mission-critical data, the proliferation of virtualization and cloud within the data center, and the erosion of organizational …
Modern day pirates
Many of you will remember long summer days with the streets filled with laughing children congregating to play football or just hang out with their friends – I certainly …
Overcoming the hacker hurdle during the Olympics
During the Beijing Olympics it’s reported there were upwards of 12 million “cyber security incidents” per day . Hacking has evolved tremendously since …
Five steps for a secure cloud transition
Almost every type of SMB is examining its current IT infrastructure, determining what data and processes can move to the cloud. Of course, security remains one of the biggest …
The dangers of Java and what to do about it
Since late 2010, Java exploits have become way more popular with hackers than the Adobe-related ones. The problem with Java is not so much in the newly discovered …
One in ten SMEs have suffered a data hack
One in ten small businesses in the UK have experienced a data hack. Hiscox research also revealed that 90% don’t have a cyber crime insurance policy in place to protect …
Software security guidance for Agile practitioners
SAFECode released a paper that provides practical software security guidance to Agile practitioners in the form of security-focused stories and security tasks they can easily …
IPv6 and click fraud
The good news: To accommodate the ever-increasing demand for IP Addresses around the world, every network will eventually transition to IPv6 from IPv4. The bad news: Spammers …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics