Video Screencast Help

Search

Search results

Give an attacker a phish and he will steal some data. Teach an attacker to spear phish and he will steal data bases.   Among the wide diversity of threats facing the modern enterprise, targeted attacks are often the most troubling and difficult ...
Blog Entry by Sdesc | 15 Apr 2014 | 0 comments
What is Heartbleed? By now, you should be very well aware of vulnerability CVE-2014-0160 , nicknamed HeartBleed.  Security engineers at Codenomicon and Google discovered a vulnerability last week in the popular OpenSSL cryptographic ...
Blog Entry by vgtero | 18 Apr 2014 | 0 comments
What is big at the big show this year. One of the great things about being the Health IT Officer at a big security firm is that no one really knows what you do.  I get to slip quietly ...
Blog Entry by David Finn | 11 Feb 2014 | 0 comments
Medical Records held for Ransom Yahoo!7 News Australia just published a noteworthy article: " Cyber attacks: pharmacies, patient records targeted 'ransomware' attacks ...
Blog Entry by Axel Wirth | 21 Jan 2014 | 1 comment
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
The Concept of Zero-Trust   ( republished from http://security-musings.com  )       To allow for near-future work models, where employees can bring their own mobile devices into the workplace,  where “work from home” ...
Blog Entry by mike_ball | 10 Oct 2013 | 0 comments
Today, nearly all of an agency’s mission-critical functions depend on safe and secure information technology systems. With cyber threats ever evolving and growing at an exponential rate, and increased reliance on technology to deliver core services in ...
Blog Entry by darci_hunt | 14 Aug 2013 | 0 comments
Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by rshaker2 | 29 Jul 2013 | 3 comments
I attended a webinar recently which was talking about the move from physical to virtual servers in large corporations. The analogy used was that today, approximately 70% of all servers can be virtualised very quickly, but the remaining 30% can take ...
Blog Entry by MFox70 | 24 Jul 2013 | 0 comments
Commençons par bien comprendre les termes. Le risque est un danger éventuel, plus ou moins prévisible, inhérent à une situation ou à une activité. La conformité est l’état de ce qui présente un accord complet, une adaptation totale. On note ...
Blog Entry by ppayen | 27 Jun 2013 | 0 comments