Archives
You are currently viewing archive for November 2010
Posted By Carl Engelbrecht

Ah, if you don't look for it you likely won't find it...HOPE is not a security strategy!

"Interestingly, organizations with the strongest security policies, procedures and defenses reported the highest number of security breaches, Oltsik said. That is because less mature companies don't even realize they are being infiltrated."

http://preview.tinyurl.com/2vyeksj

 
Posted By Carl Engelbrecht

"ForensicVue helps ensure an organization's IT assets are protected against fast evolving security breaches and policy violations by enabling Enterprise security analysts to search across tens of thousands of nodes, over a sustained period of time and across all security and compliance data to enable proactive protection of Enterprise information assets."

http://preview.tinyurl.com/32u5y64

 
Posted By Carl Engelbrecht

Big Brother won't like this!

"The Mobile Security Card VE 2.0 contains a cryptocontroller which encrypts cell phone conversations and securely authenticates the user."

http://preview.tinyurl.com/35dlntl

 
Posted By Carl Engelbrecht

"Copper thefts on rise as value increases"

http://preview.tinyurl.com/2u9d5j5

 
Posted By Carl Engelbrecht

This could be a win-win for us surfers...

"Makers of Firefox Browser Explore Do-Not-Track Tool After Scrapping Earlier Effort"

http://preview.tinyurl.com/29fbp2j

 
Posted By Carl Engelbrecht

You can run but you can't hide!

"Whether you click it or not"

http://preview.tinyurl.com/2w265qa

 
Posted By Carl Engelbrecht

Exactly why companies like Google scare the hell out of me...they know what I want before I do!

"The paper examines the increasing role of analytics – the use of information to make decisions and to create new products and services – in 21st century organizations."

http://preview.tinyurl.com/2wb2rlk

 
Posted By Carl Engelbrecht

"The latest version of the malware overwrites data in files instead of simply deleting files after encryption, the approach taken by previous versions of GpCode. The approach makes it far harder to use data-recovery software."

http://preview.tinyurl.com/2aprc7x

 
Posted By Carl Engelbrecht

"With over 85% of respondents confirming that their company allows the use of these removable media devices (and with many of those working where USB drives are banned confirming that they use them anyway), it is very concerning that more than half of the respondents confirmed their USBs were not encrypted, leaving the corporate information on them completely vulnerable if borrowed, lost or stolen."

http://preview.tinyurl.com/329ghw4

 
Posted By Carl Engelbrecht

"Over the past few days, the U.S. Justice Department, the Department of Homeland Security and nine U.S. Attorneys’ Offices seized 82 domain names of websites they claim were engaged in the sale and distribution of counterfeit goods and illegal copyrighted works."

http://preview.tinyurl.com/3ad3qhb

 
Posted By Carl Engelbrecht

"Streaming pay TV may be Microsoft's next big thing as the software giant has reportedly held talks with content companies. That's the word from company sources at the Reuters Global Media Summit. A Microsoft TV service would use Xbox Live and compete with Google TV and Apple TV. Microsoft TV isn't likely to be available for at least a year."

http://preview.tinyurl.com/32vwp7f

 
Posted By Carl Engelbrecht

HTTPS Everywhere seems similar to the current issues surrounding Skype and the Blackberry around the globe. Am I missing something?
As an interweb surfer I look forward to the day when all my traffic traversing the ‘wire’ is encrypted.
As a LAN administrator and the increasing frustration of securing information, this clearly becomes problematic and further challenges my ability to filter content and files crossing the network perimeter.
As more and more web servers implement “always on” SSL (as they will and should) the less visibility I have to what is entering/departing my domain.
It appears we just can’t get away from the simple lesson that whitelisting is the only real solution which neither I nor anyone else really wants to fully implement.
Once again I begin to find myself back in a reactive position with little control of effects the weakest link can do…D’oh! Dam those mouse clicks anyway!

 
Posted By Carl Engelbrecht

"Thousands of travelers and consumers can fall victim to electronic pickpocketing and never even know it because they carry new credit cards and U.S. passports."

http://preview.tinyurl.com/26wmvjj

 
Posted By Carl Engelbrecht

"Simply put, Stuxnet is an incredibly advanced, undetectable computer worm that took years to construct and was designed to jump from computer to computer until it found the specific, protected control system that it aimed to destroy: Iran’s nuclear enrichment program."

http://preview.tinyurl.com/28xr82k

 
Posted By Carl Engelbrecht

"The Falcon Hypersonic Test Vehicle is designed to skim the top of the atmosphere just below space, and is a key element of the Pentagon's Conventional Prompt Global Strike (CPGS) capability — a program to build non-nuclear strategic weapons that can strike conventionally anywhere in the world in less than an hour."

http://preview.tinyurl.com/2wnrh2s

 


 
Google

User Profile
Carl Engelbr...
Male
Holly Spring...

 
Archives
 
Visitors

You have 1457818 hits.