Video Screencast Help

Search

Search results

Attacks by viruses, trojans and other malware have often been considered as a Microsoft problem. Whilst Microsoft may have initially been slow to realise the significance and impact of malware, with  Windows XP Service Pack 2 and Microsoft’s Trustworthy ...
Blog Entry by GregDay-SecurityCTO | 10 Jul 2012 | 0 comments
A conversation I sometimes get involved in with customers is, "How should we secure vSphere?" The environment doesn't have to be VMware-based of course, it could be Xen, Microsoft, Red Hat or any other, but the question remains.  From ...
Blog Entry by GregDay-SecurityCTO | 24 Apr 2012 | 0 comments
Strip away all the technical jargon and a virtual machine management package is just a software program, which emulates a real computer for each instance of a virtual machine (VM). So, it will have virtual USB ports, virtual network connections, a ...
Blog Entry by GregDay-SecurityCTO | 09 Feb 2012 | 3 comments
While it may not be the answer to everything, desktop virtualization offers a good solution for certain usage models, such as where access needs to be restricted to certain information or services, or where desktop management needs to be centralized. In ...
Blog Entry by GregDay-SecurityCTO | 04 Jan 2012 | 0 comments
While innovation is, by its nature, about creating capability, its true potential comes only when people and businesses adopt new technologies. With the best will in the world, in general this process is haphazard - nobody has advance knowledge of what ...
Blog Entry by GregDay-SecurityCTO | 23 Nov 2011 | 0 comments
Just a few years ago, information security used to be all about education. People and organisations just weren't aware of the threats - apart from a few headline-grabbing examples of malware such as the Melissa worm , ILOVEYOU or the Anna ...
Blog Entry by GregDay-SecurityCTO | 23 Nov 2011 | 0 comments