Why spyware IDS alerts are useful
As you may know, our company provides 24x7 Network Security Monitoring services to many customers. Our…
Read MoreMicrosoft's banned function calls
After reading Michael's earlier post about SDL, I started digging a bit deeper into Microsoft's SDL…
Read MoreMicrosoft Attempting to Assassinate Google?
Microsoft appears set to display a new version of its search engine early next week. The boys in Redmond…
Read MoreVoice Over IP Security
According to NIST, with the proliferation of VOIP, the demands for security are significantly compounded.…
Read MoreVista SP2
So Vista SP2 is now available to the masses. I've downloaded it and am in the process of installing it.…
Read MoreVista SP2...it works
Well, installation wasn't too bad. It took about 20 minutes or so. As a bonus, all of my settings seem…
Read MorePhishing on Facebook
As noted on several discussion sites around the Internet, there seems to be a new phishing attack against…
Read MorePresident Obama's Cyber Security Policy
President Obama's new cyber security policy and the creation of a White House office for cyber defense…
Read MoreAvoid Becoming a Data Loss Victim
With the current US economy downturn, cyber crime is increasing at an alarming rate. Let's face it -…
Read MoreAcquiring target... NOW!
Walt Conway has some interesting commentary [treasuryinstitute.org] on the recently released Verizon…
Read More