Redhat for Security: Myth or Mantra?
When it comes to which server operating system is better, you know the score: Redhat for security, Windows Server for easier all-around operation.
When it comes to which server operating system is better, you know the score: Redhat for security, Windows Server for easier all-around operation.
Aaron Kelly | | Security
We've grown accustomed to hearing about cyber security failures at large enterprises like Target. But security threats and breaches are not just limited to the Fortune 500s of the world. Businesses of all shapes and sizes are vulnerable to cyber security threats and data...
Andy Morris | | Security
Continental Automotive is one of the world's leading automotive suppliers, employing over 215,000 people in 55 countries. With five divisions and a global network, Continental has a lot of data to transfer between several thousand internal and external customers,...
Aaron Kelly | | Security
There are quite a few routes you can take when it comes to a file transfer solution and the type of encryption to use, but say you are an SMB with very limited budget. How are you going to protect your data when you don’t have the money that an enterprise has access to?...
IT audit procedures run the gamut from internal to market-specific. Whether it's healthcare's HIPAA or the credit-card industry's PCI, you have to know the compliance audit's goals. These rarely include a fully functional missile defense system to protect against...
In early June, the news broke that the Angler exploit kit was no longer the method of choice for malware delivery, especially ransomware. According to SC Magazine, attackers have now switched to the Neutrino exploit kit, perhaps in an effort to avoid detection.
Joe Hewitson | | Security
In the modern business world, applications are the vehicles for getting stuff done. This has become even more apparent as mobile technology enables us to be more productive in more places than ever before. But despite all the buzz about security in the mobile world,...
Adam Bertram | | Automation | File Transfer | Security
You shouldn't have to babysit all of the file copies; scheduled tasks is perfect for automating this job.
The Dark Web. You've heard the term. It pops up in mainstream news stories about illegal goods, stolen identities and credit card fraud. It's a kind of digital boogeyman for ordinary users and IT pros alike, making it easy to mistake fear for facts and hype for helpful...
Adam Bertram | | Security
In today's dangerous cyber environment, it's more important than ever to protect your data. Bad guys are always on the lookout for an easy score. As a sysadmin, it's one of your many jobs to set up security controls and make sure your network is not an easy target.
Greg Mooney | | Security
For IT managers in regulated industries, audits are a way of life. Proactive record keeping will be critical for when those pesky auditors walk through the front door. This is where a secure FTP (sFTP) tool can play a big role. In a post-Enron world, transparency is key...
Scripts are the meat and juice of system administrators. Being able to make use of an extensive set of scripts suitable for different tasks is essential for a sysadmin. But how do you actually do the script management?
Michael O'Dwyer | | IT Insights | Security
IT pros should not have to support users who lack basic IT skills. A bold statement, I know. But when network users display a complete absence of IT soft skills and common sense, even as security breaches become almost commonplace, they leave us with no choice.
Adam Bertram | | IT Insights | Security
How would you define a web server as being "up"? It doesn't just respond to a simple Internet Control Message Protocol (ICMP) echo request (ping). Even though this is a great indicator of a web server's operating system being online — and it being connected to the...
Encryption keys are considered the key to the kingdom, both from a server-, service- and user-oriented approach. One of the most popular solutions for encryption keys is GnuPG, an implementation of the OpenPGP standard for encrypting and signing data and communication....
Joe Hewitson | | Security
Communication, both within the enterprise and B2B, is the lifeline of business ops. As these communications transitioned from paper to electronic data, however, a new standard was required to ensure disparate systems could efficiently handle incoming content. Thus, EDI...
If you want your meetings to put everyone outside support to sleep, schedule a presentation on SSL vs. TLS. Or you can spell it out, Secure Socket Layer versus Transport Layer Security; or simply RTSNOWU, Really Technical Stuff No One Will Understand.
David Strom | | Security
Earlier this month, President Obama promulgated his Cybersecurity National Action Plan (CNAP) to try to bring alive some of the things mentioned in the Cybersecurity Act of 2015, which the U.S. Congress passed last December. It primarily encourages the private sector to...
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.