Why spend time targeting Active Directory for domain credentials when Outlook Web Application is just as good -- and far easier to compromise?
By Fahmida Y. Rashid | 07 October, 2015 19:43
Most merchants now have EMV credit card readers in place, yielding marginally improved security today -- and a platform for better payment systems arriving soon
GitHub developers will now be able to log in to the code repository using YubiKey hardware keys
An activist group is on a quixotic campaign to punish tech companies who support the controversial information-sharing bill
With Device Guard and Credential Guard, Windows enjoys unprecedented protection from malware and advanced persistent threats
By Fahmida Y. Rashid | 18 September, 2015 13:00
There's both art and science to predictive analytics in a security setting, early adopters say.
The power grid may not be in immediate danger, but that doesn't mean the threat to critical infrastructure isn't there
Vendors without bug bounty programs risk the wrath of the infosec community, but such programs must be constructed carefully to yield optimal outcomes
Vulnerability scanning provides visibility into potential land mines, but often just results in data tracked in spreadsheets and independent remediation teams scrambling in different directions. It is time to change from a “find” mentality to a “fix” mentality. Here’s how.
RASP can help safeguard applications, but it isn’t a silver bullet
As the Obama administration prepares to impose sanctions on Chinese companies for economic cyber-espionage, experts question whether the penalties will have significant effect
By Fahmida Y. Rashid | 31 August, 2015 21:42
Bitcoin’s widely trusted ledger offers intriguing possibilities for business use beyond cryptocurrency
Internet users will get some respite from Flash-based attacks since Google and Amazon are stopping Flash ads from displaying
By Fahmida Y. Rashid | 28 August, 2015 20:27
Malware masquerading as advertising is a growing problem, and the ad industry must figure out how to weed out scammers from legitimate companies
Reducing the surface that needs to be protected to a single application, it's easier to apply very tight controls through Software Defined Perimeter techniques.
The Agora Dark Web market cited Tor Hidden Services security vulnerabilities that could allow de-anonymization attacks and temporarily shut down operations after discovering suspicious activity on its servers.
Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value
The Ashley Madison hack continues to make headlines. Naturally, that's because the news keeps getting worse. Worse for website owners Avid Media Group. And worse for the REAL victims, more importantly -- the people named in the hacked data dump...
By Richi Jennings | 25 August, 2015 13:51
The default state of Internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute Internet anonymity
MIT researchers created the first file system that is 'mathematically guaranteed' not to lose data even when a computer crashes.
Research shows that 94% of CIOs believe that enterprise mobility has become an important part of their enterprise IT strategy. While there are many benefits for business, there are still risks when it comes to security. This whitepaper looks at the steps all organisations to take when it comes to supporting a mobile workforce.
- CCE-Commerce - Senior Web Application DeveloperNSW
- FTLinux Administrator with AWS & DevopsNSW
- CCMilitary simulation programmer with C# and Unity - 3 monthsNSW
- FTMid level IT consultant | Systems Integration & Managed ServicesNSW
- FTLevel 2 IT Support TechnicianVIC
- FT1st & 2nd level IT support all-rounder in beautiful rural BathurstNSW
- FTAndroid DeveloperNSW
- FTField EngineerNSW
- FTManual Test Engineer | Financial Institution | Web testingNSW
- FTSystems Administrator | National commercial law firm | MS, AWS & eDiscoveryNSW
- FTSenior Consultant | Project work | National Systems IntegratorVIC
- FTSystems Administrator - Managed ServicesNSW
According to IDC, sixty percent (60%) of business critical information is now stored, sometimes exclusively, in email. It۪s more important than ever to establish an email archiving strategy that ensures business continuity and information availability. Modern email archiving solutions are changing to accommodate the new realities of the digital workplace and can intelligently store, manage and discover email content to meet business and compliance requirements. Read this paper to learn how to solve your top email challenges.
- Microsoft expands FastTrack service to aid Office 365 migration for businesses
- Microsoft claims 110M devices now run Windows 10
- Greens call for Trans-Pacific Partnership assessment
- Verizon will use its mobile supercookie to target customers with AOL ads
- 8 tech startups ink $400K in new contracts
- EU Safe Harbor ruling could have bearing on Microsoft email dispute
- IPsoft's 'Amelia' virtual assistant just got a whole lot more human
- Clothing retailer Uniqlo uses brain waves to match customers with t-shirts
- With Safe Harbor gone, the hard work on data transfers starts now
- Meet Project Orca, SAP's new, Hana-based analytics tool
- Machines are replacing writers, Gartner says
- Can Microsoft's new phones save its mobile ambitions?
- Digital Guardian buys Code Green to gain data-loss prevention tech
- Microsoft charges into laptop market with Surface Book
- Cisco disrupts $60M ransomware biz