BCS & Computing UK IT Industry Awards 2013 recognise unique USB drive with PIN code access datAshur in the category for ‘technology excellence’
Author: ISBuzz Team
Security is a major concern as BYOD increases. We’re all familiar with the problems arising from data stored on unsecured devices which then go missing, but what about unsecured network access?
Linux Patch Management offers Linux professionals start-to-finish solutions, strategies, and examples for every environment, from single computers to enterprise-class networks.
On October 17th, Canonical, Ubuntu’s parent company, will release Ubuntu 13.10, Saucy Salamander. Most people will be interested in the desktop version of Ubuntu 13.10
Many security professionals have heard about Command & Control botnets, even more have been infected by them. Very few have had the opportunity to actually look inside the server control panel of a C&C.
AlienVault research engineer, Alberto Ortega has identified two Yara rules that will help malware analysts and incident responders to detect, classify and track the malware arsenal of the recently leaked KINS toolkit.
As the desire for business agility increases, companies are bypassing security teams and processes to set up risky IT infrastructures in the cloud
Recently I was reminded of this well used, wedding related phrase when my daughter announced her intention to marry. A joyous occasion for all, except, of course, the father of the bride (yes we’ve all seen that film!).
In an attempt to tackle cyber-security, two-thirds (70%) of IT professionals believe that hiring ex-hackers could be the solution, if they have the right skills needed to do the job.
Most systems are insecure, not because we don’t know about or understand the vulnerability but because we fail at planning and communicating the solution to address or mitigate the vulnerability.