| GFI Endpoint Security 3.0 Review
Businesses, from small to large, make a decent investment in firewalls, anti-viruses, email and web content security filters to protect their networks against external threats. Yet, any user with a USB device poses a tremendous threat to your data, no matter how well external security is.
Tuesday, 1 May 2007 02:15 EST | Reviews
Image Spam: Getting the Picture?
Spam. We’ve all seen enough of it. But just as familiarity has bred contempt (and stopped most email users responding to it), spammers have come up with a new technique to snare the unwary and get around corporate security measures.
Thursday, 5 April 2007 04:32 EST | Information Security
How to safely dispose of old mobile devices
The lifespan of notebook PCs, PDAs and smartphones is falling as the pace of technology marches ever onwards. But for every new mobile device purchased by organisations of all sizes there is usually a piece of legacy hardware that gets sold, passed on to a colleague, friend or relative, or simply thrown away in the office rubbish.
Monday, 26 March 2007 02:38 EST | Information Security
Overseeing Your Organization’s Security Posture with Active Vulnerability Management
Many IT executives today are tasked with finding a way to understand their organization’s true security posture, as they must prove that “due care” is being taken to secure their networks. The pressure to prove true security levels comes from business partners, company executives, industry regulations, and maintaining company reputation.
Monday, 26 March 2007 02:31 EST | Information Security
The Dirty Dozen: Killing False Positives
Any IT director trying to battle security threats to their networks day after day will know the feeling. Maintaining a clear view of their true security position is a constant, enervating battle, devouring man-hours and resources.
Friday, 9 March 2007 08:52 EST | Information Security
What’s Important in Web Application Security Testing
As with many other business analysis issues, there are three sides to the story when looking at Web application security testing: yours, the findings of your vulnerability assessment, and the truth. Whether you’re using a commercial or open source scanner, you’re undoubtedly going to glean a lot of information and come across vulnerabilities.
Thursday, 8 March 2007 11:01 EST | Information Security
Managing Compliance in a Multi-Regulatory World
CISOs in highly regulated industries such as Banking, Healthcare and Securities are challenged to ensure that their systems and processes are in compliance with multiple security and privacy requirements derived from various frameworks and specifications, each supporting one or more regulations.
Monday, 5 March 2007 11:02 EST | Information Security
5 laptop security tips
20.07.07 Laptop theft is a huge problem.
Essential Bluetooth hacking tools
25.05.07 Bluetooth provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires.
DEP for IE7 in Vista
22.05.07 Security tips blog, security-hacks, has posted details on how to enable DEP for Internet Explorer 7 in Vista.
SMB over SSH: Secure File Sharing
18.05.07 Security tips blog, security-hacks, has published an simple guide to share files securely in heterogeneous networks.
Avoid data leaks by clearing the page file
14.05.07 Security-Hacks publishes a useful tip to avoid potential data leaks when you run out of memory.
How to set Master Password in Firefox
11.05.07 Nowadays many web sites require you to type a user name and password before you can enter the site.
How to test your firewall?
10.05.07 Security tips blog, Security-Hacks, has published a compilation of tools to test your firewall: "We’ve compiled a list of tools we believe will be of value to both home users and advance users.