Recently there has been a lot written about Advanced Persistent Threats or APTs. In reviewing many definitions of these threats by industry experts and security organizations, here is a common definition of this newer type of threat that is increasingly making the news: Advanced ...
Read MoreThis is one of the critical areas of 2012. An absolute must in the IT world is to control access privileges to areas of the network that are key to running a business. Such as data, applications, operating systems... Organizations may use a mix of solutions to minimize any kind of access risk. ...
Read MoreCyber thieves are busy staying ahead. Here are a few tricks that will keep them on their toes and you somewhat away from their bullets. Following these guidelines will make you a difficult target to reach.
H. D. Moore of leading vulnerability scanner company Rapid7 has just determined that as many as 200,000 systems connected to the Internet could be hijacked by hackers exploiting bugs in Symantec's pcAnywhere. Even worse for those in retail, up to 5,000 of those are running point-of-sale software ...
Read MoreLast month we provided some important guidelines to use when creating passwords for accessing your various web site and applications. This month we want to show some examples of how you apply those guidelines. Recall from last month that we have a fixed phrase "I like Dogs" which translates to a ...
Read More