Expert analysis
Risks and Threats To Storage Area Networks
Introduction Every business faces risk as long as they have something of value. The more valuable the assets of the company are, the more risk they face. Data value increases …
Laptop Theft – An Insider’s Guide To Not Becoming Another Statistic
When laptops were first available, they were treated with great care and attention. To be given a laptop by your company marked you out as someone special. Today, the laptop …
Encryption – The Missing Defence Tool In Many Companies’ Security Policy
Over the last few years, protection against external attacks has been the main focus of information security policies and purchases but this has caused the other aspects of …
Browser Identification For Web Applications
Browser Identification is not a new concept. With the focus having shifted to desktops from networks and servers, a topic such as remote browser identification needs to be …
Snort on Window Server 2003
The setup the author is discussing is running Snort 2.3.3 on Windows Server 2003 with PHP5 and SQL 2000 SP4. All other components are also the latest available for public use. …
Security Risks Associated With Portable Storage Devices
It seems that nearly every new electronic device on the market today comes equipped with data storage and transfer capabilities. From USB sticks to smart phones, MP3 players …
Securing Storage: Complete Data Erasure on Storage Systems
Out of sight, out of mind. When storage systems are upgraded, retired due to proactive maintenance, reach the end of their lease, or are repurposed or resold, companies often …
The Key to Compliance
In the wake of the Enron and Worldcom accounting scandals, the regulations an enterprise implements to ensure its integrity are open to increasing scrutiny. This has given …
How well do you know your partner?
For those of you who follow the news, you may have read the recent story of spy software discovered at some of Israel’s leading companies which reads just like the spy …
An Introduction to Securing Linux with Apache, ProFTPd and Samba
While the vast majority of Linux users are hard-core techies, some may be using Linux because they want to try something new, are interested in the technology, or simply …
Gerhard Eschelbeck on the Common Vulnerability Scoring System (CVSS)
Gerhard Eschelbeck is the CTO & Vice President of engineering of Qualys. In this audio Mr. Eschelbeck discusses the Common Vulnerability Scoring System (CVSS), the …
Does Firefox Really Provide More Security Than Internet Explorer?
Introduction Internet Explorer is a graphical web browser made by Microsoft and comes integrated with Windows. Even though it’s by far the most widely used browser, …