Archive for November, 2010
In the spirit of keeping blog posts informative, short and fun, this one takes a cue from David Letterman in format. So without further fanfare or wasted space… the Top 10 Reasons To Use Licensed Software Vs Freeware are:
In a new survey conducted by Unisphere Research, results showed that even as many Database Administrators (DBAs) are willing to assume much needed security practices in their daily duties, there is an overwhelming communication disconnect between these data managers and the security and executive leadership responsible for the data security at the end of the day.
Although corporate networks today are increasingly open to subcontractors, partners or affiliates, or simply a workforce on the move, the tendency is still to think of security in the same way castles were defended in the middle ages, by building bigger walls – higher, wider and with more built in obstacles.
The Economic Stimulus Act of 2008, which was extended to 2009 and 2010, is now coming to an end this year and the associated benefits with Section 179 will also be lost to businesses. Section 179 of the IRS tax code encourages businesses to buy equipment/software and invest in themselves to help spur our economy.
So you’ve invested heavily in antivirus software but still seem to have to deal with the latest viruses, trojans, ransomware until your AV provider can can formulate and download the cure. The question that should be top of mind is whether or not there is a way to prevent or at least limit malware from ever even entering your IT environment?
In the spirit of keeping blog posts informative, short and fun, this one takes a cue from David Letterman in format. So without further fanfare or wasted space… the Top 10 Reasons to Implement Least Privilege on Linux Servers are:
The Department of the Interior Inspector General has issued a report that is critical of the agency’scybersecurity performance, summarizing that its efforts fall short of the federal government requirements. For example, the security levels of certain types of IT systems were not categorized correctly.
If you have been following your security news the last couple of days you will have seen that there have been a handful of headlines about the “Dirty Dozen” most vulnerable applications with Google Chrome coming in at number one. Just from that fact alone I became quickly suspicious on the science behind the calculations…
In a Computerworld article, last week, exploring the ‘scary side of virtualization’, the reporter, took some time out in a sidebar, to offer some sage staffing advice.
Have you ever been asked, “How long has that vulnerability been in our systems?” Have you ever wondered if your patch management process is keeping up with the number of new vulnerabilities being identified? Keep reading…