Blog Software as a Service (SaaS) is growing in popularity, and along with it comes the inevitable debate over the security implications. Driving the debate is recent news about a security breach affecting clients of SaaS vendor Salesforce.com, including Automatic Data Processing Inc. (ADP) -- one of th...
Blog Earlier this week, Context Information Security revealed the astonishing findings of its investigation into a sampling of four cloud service providers (CSPs) - Amazon EC2, Gigenet, Rackspace andVPS.net. Context found unpatched systems, missing antivirus and back doors left open, leaving cloud cust...
Blog The two latest malware strains exploit Facebook users via email and instant messaging programs. The first, Asprox.N, is a Trojan delivered via email informing users their Facebook account is being used to distribute spam and that, for security reasons, the login credentials have been changed. Th...
Blog How much do you really know about what Microsoft has to offer? Microsoft Windows (Client) Premium editions of Windows Vista: Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise and Windows Vista Ultimate Basic editions of Windows Vista: Windows Vista Home Basic,...
Blog Software developers make common and avoidable mistakes that create vulnerabilities and expose their software to ever-present security threats, according to field observations by Vic DeMarines. Yesterday I spoke with Vic, VP of products at V.i. Laboratories Inc. (V.i. Labs) in Waltham, Mass. V.i. Lab...
Blog Whos your daddy? -- sang the Zombies in their 1967 hit Time Of The Season. Then came Ray Winstone in Scum in 1979, he was certainly the daddy. Fast forward to 2018 and whos the daddy? Secure AWS-native data protection company Cloud Daddy thinks it could have the answer. Available on the A...
Blog Seven years ago, Microsoft was a byword for buggy software. Its codebase was a notorious happy hunting ground for delinquent virus writers. The "Summer of Worms" in 2003, when the Blaster, Welchia and Sobig malware wreaked havoc, turning computer viruses into kitchen table conversation topics, is n...
Blog I make no secret of the fact that my first interest in security is around the online product side of things. So easy to get completely wrong and the same old lessons are continually being relearnt. I used to take a smug satisfaction in showing developers how easy it could be to find the flaws in the...
Blog I ran into a problem with our Sharepoint 2010 site not allowing pdf files directly it would only prompt you to save it. I found the fix was pretty simple and that was to do the following. Just be aware you are opening up the security on the sites with the files. 1.Verified Adobe Reader opti...
Blog There were more than 600 exhibitors in April at this year's RSA Conference in San Francisco. The attendance was almost touching 50,000. There are some very prominent key cybersecurity concerns that will keep IT managers on toes for next couple of years, at least. Those in the Asia Pacific and Japan ...
Blog After this morning's news of the Red Hat Fedora 16 operating system and its relevance and applicability to cloud computing and virtualisation, further news in this zone appears to have surfaced.Notwithstanding Fedora's perhaps more modest mention of its cloud relevance, Oracle has this afternoon fol...
Blog There are several reasons PKI has failed, says Peter Tippett, head of the industry solutions and security practice at Verizon Business. The main reason organisation do not use PKI, he told attendees of RSA Conference 2011, is that it costs too much. Speaking on a debate on the importance of identi...
Blog Application-based implementation audits assess any or all parts of the deployment process of a project. The IT auditor should assess relevant SDLC stages, as they are occurring, to highlight risks or issues and provide necessary risk mitigation recommendations to the appropriate management. ...
Blog Join IT Knowledge Exchange and Microsoft for these Upcoming Live Expert Chats Todays workforce faces a constantly evolving landscape of threats to information and infrastructureand even to regulatory compliance. Endpoints are exposed to attacks both inside and outside the corporate firewall, r...
Blog Mobility is about much more than technology. Alan Murray of mobile application management vendor Apperian joins us to discuss all the other issues that factor into a successful mobility initiative. Our hosts also chat about mobile security and review Microsoft's Surface 3.
Answer i am getting this error event id 1202( security policies were propagated with warning. 0x4b8 : An extended error has occurred)in windows 2003 enterprise server which is dc in our domain environment , this error comes after every 5 minutes in application events. i have tried all microsoft articles re...
Answer I have an application in Visual Basic 6 with SQL Server as the back-end. It is supposed to be run on a server, but it will not access the server when installed and run on a clients machine. I think it might be a code issue; I have used the following coding at form load: cnh = "Provider=SQLOLED...
Blog News has emerged from US-CERT that a USB battery charger (specifically the Energizer DUO) carries with it a trojan, buried in the Windows application that can be used to monitor the charger status. Apparently the backdoor enables remote system access.This just goes to show the importance of checking...
Blog Traditional antivirus vendors are doing a good job detecting and blocking known mobile malware, according to Av-Test, a Germany-based independent service provider that tests antivirus and antimalware software. The firm tested the detection capabilities of a variety of available Android mobile secur...
Blog Steady adoption of the internet of things continues to dramatically influence industrial architectures. Organizations can now gather and draw insight from a greater volume and variety of data across more diverse sets of applications. And as the movement of information between disparate hardware and ...