Overcoming the hacker hurdle during the Olympics
During the Beijing Olympics it’s reported there were upwards of 12 million “cyber security incidents” per day . Hacking has evolved tremendously since …
Five steps for a secure cloud transition
Almost every type of SMB is examining its current IT infrastructure, determining what data and processes can move to the cloud. Of course, security remains one of the biggest …
The dangers of Java and what to do about it
Since late 2010, Java exploits have become way more popular with hackers than the Adobe-related ones. The problem with Java is not so much in the newly discovered …
One in ten SMEs have suffered a data hack
One in ten small businesses in the UK have experienced a data hack. Hiscox research also revealed that 90% don’t have a cyber crime insurance policy in place to protect …
Software security guidance for Agile practitioners
SAFECode released a paper that provides practical software security guidance to Agile practitioners in the form of security-focused stories and security tasks they can easily …
IPv6 and click fraud
The good news: To accommodate the ever-increasing demand for IP Addresses around the world, every network will eventually transition to IPv6 from IPv4. The bad news: Spammers …
How to make smart grids
A smart grid is an upgraded electricity network with two-way digital communication between supplier and consumer. The adoption of smart grids will change the distribution and …
Top skills for IT asset management leaders
The evolving and growing role of IT asset management (ITAM) is driving both increased demand for existing skills and a new requirement for augmented financial, commercial and …
Do you need a honeypot?
It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …
Simple safe web browsing tips
The most important thing to remember about cyber security is that people using their touchpad or mouse are the last line of defense. Technologies such as anti-virus, safe …
Exploring the world of digital forensics
Jess Garcia, founder of One eSecurity, is a senior security engineer and an active security researcher in areas of incident response, computer forensics and honeynets. In this …
Enterprise log managers: An unsexy but vital tool
Ultimately, the goal of Enterprise Log Management (ELM) is to get your most critical events escalated to your operations staff to react and respond with the appropriate …