Video Screencast Help

Search

Search results

What is big at the big show this year. One of the great things about being the Health IT Officer at a big security firm is that no one really knows what you do.  I get to slip quietly ...
Blog Entry by David Finn | 11 Feb 2014 | 0 comments
Medical Records held for Ransom Yahoo!7 News Australia just published a noteworthy article: " Cyber attacks: pharmacies, patient records targeted 'ransomware' attacks ...
Blog Entry by Axel Wirth | 21 Jan 2014 | 1 comment
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
The Concept of Zero-Trust   ( republished from http://security-musings.com  )       To allow for near-future work models, where employees can ...
Blog Entry by mike_ball | 10 Oct 2013 | 0 comments
Webcast Tue, 15 October, 2013 - 10:00 - 11:00 PDT Join our upcoming webcast to learn about a new ...
Event by Elspeth Magoria | 26 Sep 2013 | 0 comments
Today, nearly all of an agency’s mission-critical functions depend on safe and secure information technology systems. With cyber threats ever evolving and growing at an exponential rate, and increased reliance on technology to deliver core services in ...
Blog Entry by darci_hunt | 14 Aug 2013 | 0 comments
Thousands of years ago, news traveled at the pace of man or animal. I mean to say you would only learn what someone else was doing or what was happening either in the next town, village, kingdom, etc. only as fast as it could physically get to you. It ...
Blog Entry by rshaker2 | 29 Jul 2013 | 3 comments
I attended a webinar recently which was talking about the move from physical to virtual servers in large corporations. The analogy used was that today, approximately 70% of all servers can be virtualised very quickly, but the remaining 30% can take ...
Blog Entry by MFox70 | 24 Jul 2013 | 0 comments
Patching.   It’s a painful topic for most IT professionals, seen as the eternal battle between keeping a system running, functionally up to date yet ensuring it is secure. Some organisations I talk to have a monthly patching cycle, which ...
Blog Entry by MFox70 | 26 Jun 2013 | 0 comments
You must have been taking a long (and probably well deserved) holiday if you have not noticed the increasing use of the term “cyber” in the press recently. Anything security related is now a cyber risk, a cyber incident or a cyber attack. Governments ...
Blog Entry by James Hanlon | 10 Jun 2013 | 1 comment