Blog I discovered an interesting article online: New Hacking Tools Pose Bigger Threats to Wi-Fi Users. The accompanying video from Hak5 is also quite interesting (provided for the hard-core tech types). If you read the article, and watch the first 5 or 10 minutes of the video, you quickly reali...
Blog That screaming you heard today? That was the sound of hundreds of IT professionals reacting to the Apple App Store created today for the new iPhone. A 3G version of the phone is being released this week and enterprise software vendors are beginning to take notice, giving credibility to the iPhone in...
Blog I've been working in some depth around Windows security topics since 1997, when I began teaching Windows hardening classes at Interop with my colleague and co-author James Michael Stewart. In 2003, I started researching malware topics and tools, a quest that eventually led to my 2005 book "Fighting ...
Blog A very interesting question I found on the forum asking what would be some of the emerging trends in information technology this year. Instantly following emerging trends popped up in my mind as listed below: 1. Cloud: Technology and cloud are bound to become synonyms soon. In fact, for some, it ...
Blog If you pay attention to mainstream media, you can easily get the wrong idea about online attacks. The press usually only covers the sensational data breaches like the recent Epsilon and Sony fiascoes. Truth is, there are far more people at risk than the press leads you to believe. Consider the case...
Blog TSA loses hard drive with personal info The Transportation Security Administration has lost a computer hard drive containing Social Security numbers, bank data and payroll information for about 100,000 employees. Lax security led to TJX breach Security pros left windows open. [TheReg] Windows activ...
Blog Blockchain, best known for being the technology behind cryptocurrencies such as Bitcoin and Ethereum, has gained significant popularity over the last couple of years. Today, however, its value in other applications may be greater than the initial application which popularized the technology. Known ...
Blog Jailbroken phones are more prone to security threats, researchers say. The emergence of an exploit used by a website for iPhone "jailbreaking" prompted security researchers to issue warnings about smartphone security. The website, Jailbreakme.com, allows iPhone and iPad users who visit the site ...
Blog In our monthly feature, we highlight the content that's been most popular with our readers and share it with you. For February, Windows Server admins were interested in new Microsoft CEO Satya Nadella, the latest Patch Tuesday updates and securing Windows Server. IT pros react to Satya Nadella as ...
Blog In light of the recent Flashback Trojan that infected an estimated 600,000 Mac users last month, industry experts are discussing Apple's security. The perception has always been that Apple's OS is more secure than Microsoft's. This was led by the misconception that Apple computers could not be infec...
Blog This is an interesting and sensible approach to security. I would call these the "Logics of Cyber Security" because they're so basic they could well be the principles upon which all cyber security can be based. The paper's authors call them "first principles," defining such as "...a basic foundati...
Blog New vulnerabilities list outlines the most common database problems that could lead to a costly data breach. Database administrators are all too familiar with the issues outlined in Application Security Inc.s new Top 10 database vulnerabilities list. From the use of default passwords to patchin...
Blog Understanding Elastic Caching Plaftorms - IBM eXtreme Scale Data Caching is a standard technique used for improving application performance. Local caching, though the fastest, is not able to scale and caching multiple copies of the same data in local caches raises a complication of keeping the copie...
Blog IncludeOS is a unikernel, a special type of library operating system that allows developers to write and run their application in the cloud... in place, that is, of a more traditional OS. Unikernels are said to run without many of the heavy overheads of Unix-like OSs. CEO of IncludeOS Per Bu...
Blog When discussing Business and IT roles and responsibilities - the Who Does What, Why and When? -were trying to position activity according to efficiency: to the arena that is best suited to a particular action by virtue of knowledge, resource, and responsibility. This facilitat...
Blog Software application developers tasked with shoring up the buttresses of our national and corporate defences may have been disheartened by recent reports forecasting nothing but future doom for data security. The Gartner risk and security summit in London last month featured a range of speakers a...
Blog I'm always excited when I stumble across an area which is an intersection of two of my favorite topics. Recently, I started reading Applied Security Visualization by Raffael Marty. In the book, Marty introduces the concepts and techniques of network visualization and explains how you can use that in...
Answer I have no experience wih ASP or web server based applications, but I have an Access program that I need to put on the web. What is the easiest route to full web implementation for a program that is currently using Access as the front end for a 200+GB db? The application needs to be secure. It con...
Blog Hi all, The ASA-X series has many benefits including higher throughput and an IPS that can be installed by simply adding a license key to the ASA-X series. But what about context based security? For example, lets say that you want to block FaceBook for people that use Macs (because you don...
Blog Twitter image via Shutterstock It's almost the end of the month...do you know what that means? It's time for another #ITKESecurity Twitter chat! Our experts, including Kevin Beaver, Jeff Cutler and Ken Harthun will be returning on February 25th at 1 PM (EST). And what will be the big topic? This m...