Security » Opinions »

  • The post-acquisition blues

    The company calls in our manager to take a look around at a small software company it’s acquiring — after the deal has been signed.

    28 April 16 23:32 Written by By Mathias Thurman
  • Even paradise needs backups

    Holiday travel is no time to drop your guard, especially if you take any electronic devices along.

    25 April 16 22:49 Written by By Kenneth van Wyk
  • When Locky strikes

    A friend’s company is hit with aggressive ransomware and calls our manager for advice.

    20 April 16 00:05 Written by By J.F. Rice
  • Let’s not make secure encryption illegal

    Restrictions are abhorrent and a draft bill in the Senate is overly broad and ambiguous. But if Congress insists on restrictions, let's add some critical limits.

    15 April 16 07:13 Written by Evan Schuman
  • ​The new IP sets a high bar for cybersecurity

    With old IP networks, security is implemented by devices that are deployed at the edge. However, in the cloud era - where data centre and networks converge and access becomes increasingly mobile, the concept of the perimeter disappears.

    31 March 16 16:59 Written by Gary Denman
  • Stop Passing Around Those Passwords!

    The company has sanctioned the use of an online password vault, so why is there a spreadsheet making the rounds that contains scores of passwords to servers that contain sensitive data?

    30 March 16 23:02 Written by By Mathias Thurman
  • Surprise! You have mystery PCs

    Vulnerability scans uncover on the network unpatched, unprotected PCs that IT never even heard about.

    15 March 16 08:03 Written by By J.F. Rice
  • Cloud Security Training and Certification

    More and more enterprise organizations are planning and deploying into cloud platforms.  This trend is occurring despite organizations historical push-back on cloud services claiming that they are less secure than private on-premises data centers.  Even though there is evidence to suggest that cloud application attacks are on the rise, there are best practice methods to secure cloud services.  On one hand, internal data center services may be tucked nice and neat behind the corporate perimeter firewall, there is evidence that many enterprises do not secure their systems adequately.  On the other hand, even though a cloud serve may be out-of-site and virtualized in a hyperscale multi-tenant data center, patching and solid discipline can make them secure.  Now that enterprises have a clearer understanding of cloud services and how to secure them, there are now commonly accepted methods to help make clouds more secure.  The appearance of cloud security training and certifications is helping organizations securely consume cloud services.

    08 March 16 05:11 Written by Scott Hogg
  • Surprising tips from a super-hacker

    Virtually everyone in technology knows about Kevin Mitnick, the one-time fugitive hacker who is now a security consultant. Mitnick has a wealth of security advice for the public.

    07 March 16 21:58 Written by Mike Elgan
  • Good security begins with the endpoint in mind

    In my work with new customers, I have yet to find a single one who has even a simple majority of workstations -- or endpoints as they are often known -- patched properly. Since much of the malware in existence takes advantage of known vulnerabilities, endpoint patch management is the front line of network security. This article will review the common excuses for poor patch practices, and offer specific suggestions for improvement.

    04 March 16 06:53 Written by Robert C. Covington
  • The irony in the FBI's request to unlock the iPhone

    As the FBI presses forward with its court case to force Apple to create software to unlock an iPhone used by one of the San Bernardino terrorists, it could be opening a huge security hole for government employees everywhere.

    03 March 16 06:48 Written by Lucas Mearian

Market Place