Items Tagged with "Security"


Black Hat 2011 USA: Phillipe Courtot - CEO - Qualys

August 08, 2011

Black Hat USA Interview: Demonstrating a unique mix of technical vision, marketing and business acumen, Philippe Courtot has repeatedly built innovative companies into industry leaders. As CEO of Qualys, Philippe has worked with companies to improve their IT security and compliance postures...

Comments  (0)


Preparing a Mobile or PC for Resale or Donation

July 29, 2011 Added by:Robert Siciliano

You may have read my last post where I talked about “Clean the Clutter” out of your life and sell all the stuff you don’t absolutely need. Prior to selling my electronics I wiped all the data off of each device. Cleaning all the data off your salable electronics is absolutely essential...

Comments  (1)


Today is Annual System Administrator Appreciation Day

July 29, 2011 Added by:Headlines

While we enjoy the opportunity to go home from the office at the end of the work day, SysAdmins are still on the job fighting off unauthorized access attempts, protecting our sensitive data, and working hard to improve network performance...

Comments  (1)


DHS Announces Partnership To Protect Kids Online

July 29, 2011 Added by:Headlines

"Now, more than ever, it is important that all Americans — adults and children alike — learn to protect themselves online and do their part to ensure that cyberspace is a safe and secure environment for all Internet users..."

Comments  (0)


Understanding the Customer is the Key to Success

July 27, 2011 Added by:Rahul Neel Mani

ArcSight which was acquired by HP last year was started when the Dot Com bubble had burst. CTO Forum talks to Hugh Njemanze, ArcSight Founder and VP & CTO, HP Security Solutions about the company’s journey so far and how the company has been able to sustain a robust growth...

Comments  (0)


Top Ten Dangerous Internet User Behaviors

July 26, 2011 Added by:Headlines

Call it laziness, or perhaps an unjustified feeling of immunity - the "that will never happen to me" syndrome. Ether way, all the efforts of security experts and vendors are regularly being undone by the risky actions of end-users, and the cyber crooks are capitalizing on this fact...

Comments  (0)


Surveillance or Security? New Wiretapping Technologies

July 20, 2011 Added by:Ben Rothke

Far too many books on privacy and surveillance are filled with hysteria and hyperbole and the threat of an Orwellian society. This book sticks to the raw facts and details the current state, that of insecure and porous networks around a surveillance society...

Comments  (1)


Seven No-Cost Security Tune-Ups for Windows

July 19, 2011 Added by:Headlines

"Don't use Internet Explorer or, for that matter, Safari... neither is as secure as Chrome, Firefox or Opera. IE 10 is certainly safer to use than previous versions, but significant security flaws that could expose your Windows system to malicious code online tend to crop up with it..."

Comments  (0)


Software Security Degree Programs

July 17, 2011 Added by:Bozidar Spirovski

More institutions are providing programs and degrees focused on the security aspect of information technology than ever before. Part of the reason for this is the significant projected increase in the number of jobs available in the field...

Comments  (1)


Facebook Scam: Casey Anthony Confession Video

July 12, 2011 Added by:Headlines

The operation lures Facebook users into distributing a link that professes to show an exclusive video of recently acquitted suspect Casey Anthony confessing her guilt in the mysterious death of her young daughter...

Comments  (0)


Congress to Use Skype Despite Security Concerns

June 29, 2011 Added by:Headlines

Members of Congress will now be allowed to use Skype video conferencing on government networks. The announcement comes on the heels of revelations that Microsoft had filed a application in 2009 seeking to patent technology that allows for surreptitious recording of Skype transmissions...

Comments  (0)


Thoughts on Trustwave's 2011 Global Security Report

June 22, 2011 Added by:Robb Reck

We bring in these third party vendors because we trust that they have all the experience and knowledge with a given security product. But they are missing a critical piece: Experience with our systems. No technology solution is complete and ideal for every environment out of the box...

Comments  (2)


Cynical Security Cliches

June 17, 2011 Added by:Javvad Malik

Auditors are always trying to pin something on security departments. They’ll doggedly pursue every lead, using their statement of work as an all-access pass to the security procedures. Worse, the cynic can even find himself becoming a chief suspect in his own investigation...

Comments  (1)


Security - Stupid Is As Stupid Does

June 12, 2011 Added by:J. Oquendo

With so much being spent on security - Firewalls, Intrusion Detection Systems, Intrusion 'Prevention' Systems, Intrusion 'Tolerance' Systems, Data Loss Prevention, Certified Security Professionals, Standards, Guidelines, and the list goes on, why are these companies failing?

Comments  (18)


Disabling Facebook's Facial Recognition for Privacy

June 08, 2011 Added by:Headlines

What is truly annoying about Facebook's setup from a privacy perspective is that users have very little control over what other members post about them, particularly when it comes to photos and tagging, and the facial recognition feature further aggravates the situation...

Comments  (0)


Why Your Router is the Weak Point of Your Home Security

June 05, 2011 Added by:Lee Munson

When it comes to the home router while the device is very useful, it is also riddled with many security problems. This is a real weakness in the home network. Most people do not know how the router works, so they also have no idea that they must make security adjustments to the device...

Comments  (2)

Page « < 12 - 13 - 14 - 15 - 16 > »