
Why spyware IDS alerts are useful
As you may know, our company provides 24x7 Network Security Monitoring services to many customers. Our…
Read More
Microsoft's banned function calls
After reading Michael's earlier post about SDL, I started digging a bit deeper into Microsoft's SDL…
Read More
Microsoft Attempting to Assassinate Google?
Microsoft appears set to display a new version of its search engine early next week. The boys in Redmond…
Read More
Voice Over IP Security
According to NIST, with the proliferation of VOIP, the demands for security are significantly compounded.…
Read More
Vista SP2
So Vista SP2 is now available to the masses. I've downloaded it and am in the process of installing it.…
Read More
Vista SP2...it works
Well, installation wasn't too bad. It took about 20 minutes or so. As a bonus, all of my settings seem…
Read More
Phishing on Facebook
As noted on several discussion sites around the Internet, there seems to be a new phishing attack against…
Read More
President Obama's Cyber Security Policy
President Obama's new cyber security policy and the creation of a White House office for cyber defense…
Read More
Avoid Becoming a Data Loss Victim
With the current US economy downturn, cyber crime is increasing at an alarming rate. Let's face it -…
Read More
Acquiring target... NOW!
Walt Conway has some interesting commentary [treasuryinstitute.org] on the recently released Verizon…
Read More