Security

Last Updated on 10 Oct. 2014, Total: 45 Blog Posts

  1. 10 BYOD Policy Guidelines

    The following article by Kenneth Hess lists 10 BYOD policy guidelines that organizations can use as a starting point when managing security of users’ mobile devices connected to their networks... Read More

  2. More security features for Amazon AWS

    Amazon AWS adds support for encryption of EBS data volumes and the associated snapshots... Read More

  3. Last Chance to register for the webinar: Choosing a Cloud Option to Manage Your Email

    Join Microsoft MVP Michael Noel and Hudson Casson from Metalogix on Wednesday, May 21, at 11am EDT to learn about the key factors organizations must take into account when considering a move to the cloud... Read More

  4. Heartbleed Extensions for Firefox & Chrome browsers

    The Heartbleed SSL vulnerability presents significant concerns for users and major challenges for site operators... Read More

  5. Webmin contains a cross-site scripting vulnerability

    Webmin 1.670, and possibly earlier versions, contains a cross-site scripting vulnerability... Read More

  6. PassiveDNS Tool

    PassiveDNS sniffs traffic from an interface or reads a pcap-file and outputs the DNS-server answers to a log file... Read More

  7. Free Cloud-based Vulnerability Scanner

    Tripwire SecureScan provides free vulnerability scanning for up to 100 IPs and includes comprehensive detection rules for Heartbleed to uncover the vulnerability wherever it may lie on your network... Read More

  8. How to Educate Employees on Cyber Security

    A robust Information Security policy and regular, mandatory training for all staff on information security is imperative... Read More

  9. GetGo Download Manager buffer overflow vulnerability

    Julien Ahrens (aka MrTuxracer) publishes root-cause analysis of GetGo Download Manager http response header buffer overflow remote code execution... Read More

  10. What is Passive DNS?

    Passive DNS or Passive DNS replication is a technique invented by Florian Weimer in 2004 where inter-server DNS messages are captured by sensors and forwarded to a collection point for analysis... Read More

Featured Links