Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
Excited game enthusiasts lined up outside Best Buy locations and other retail stores around the United States Monday night for the privilege of being among the first to own an Xbox 360. My local Best Buy informed me that the earliest people in...
With the release of an updated Top 20 Internet Security Vulnerabilities report, SANS said a significant percentage of attack vectors have moved from operating systems to applications and that administrators need to be aware of this fact...
You might recognize MZ if you're used to seeing its hexidecimal equivalent: 0x5A4D. In fact, the ASCII character combination MZ, placed at the beginning of a simple text file, can turn a document into a virus suspect and make that document act...
I work for an ad agency that shares a lot of files with clients and vendors. These are large graphicsheavy and multimedia files that often can't be sent via email. We need an easy way to share these files over the Internet. Currently, we use FTP...
Our information security policy requires us to configure all account passwords—including service account passwords—to expire every 90 days, which forces us to regularly change them. Is there an easy way to get a report of user account password...