Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by Robert Shaker | 29 Jul 2013 | 4 comments
You must have been taking a long (and probably well deserved) holiday if you have not noticed the increasing use of the term “cyber” in the press recently. Anything security related is now a cyber risk, a cyber incident or a cyber attack. Governments ...
Blog Entry by James Hanlon | 10 Jun 2013 | 1 comment
FileConnect latest changes do no longer include the HTTP download option but only the Java one, which most likely will redirect you to Oracle.com if your browser blocks the plugin. The idea is to restore the HTTP download option on FileConnect. ...
Idea by Shulk | 16 May 2013 | 7 comments
iGoat v2.0 ( https://www.owasp.org/index.php/OWASP_iGoat_Project ) is a program that demonstrates common iOS mobile application security weaknesses and their remediation.  There are other resources that show the use of this tool. One example, ...
Blog Entry by Michael D Smith | 13 May 2013 | 1 comment
Let’s face it users cannot be trusted to know their entire password, I am not talking about the user that writes down their passwords on sticky notes the bad guys would need physical access to actually access those. What I am really speaking to how ...
Blog Entry by Joseph.Rogalski | 29 Apr 2013 | 9 comments
I’m optimistic on the current trends in security. The concepts of “intelligence” and “big data” have to potential to shift focus to counter the current threat landscape of intentional attacks to steal or destroy valuable information. Additional focus on ...
Blog Entry by PaulTobia | 18 Apr 2013 | 0 comments
One of the biggest problems information security encounters is either the perception or reality of slowing down the business. I’ve encountered this myself in my career.  One of the ways I dealt with this problem is through an effective use of the risk ...
Blog Entry by Phil Harris | 16 Apr 2013 | 0 comments
Recently, there have been a string of high profile compromises attacking both could based services, a cloud based note taking site, a fast food companies Twitter account, as well as corporations and individuals.  A well known technology writer had his ...
Blog Entry by Joseph.Rogalski | 08 Apr 2013 | 3 comments
Is it naïve of us to think we can ever be perfectly secure? Whether it’s physically or digitally there is always a risk that something bad is going to happen. To protect ourselves physically we install alarms, locks, buy safe cars, have automatic lights, ...
Blog Entry by Robert Shaker | 03 Apr 2013 | 2 comments
This was my second year at the RSA Conference. It was interesting to come back as a "veteran" to the largest security conference (24k attendees according to rumor). I consider myself a veteran since I didn't really see differences between ...
Blog Entry by PaulTobia | 01 Apr 2013 | 0 comments