Tag: Information Security

SeCaaS Secure Cloud

SeCaaS – A Step Towards a Secure Cloud

Cloud provides its customers with many characteristics such as on-demand scalability, payment as per usage of the resources, accessibility to the data and application from anywhere in the world. With all these features provided by the cloud, security remains the major issue...

/ October 29, 2017
Blockchain Security

Blockchain Transaction Authentication and Security

In the blockchain world, data distribution to all trust less entities and immutability are the major advantages in terms of building transparency in transactions. Then what about the transactions happening between entities who want to maintain secrecy or need authentication so that...

/ October 4, 2017
Vector cloud computing concept. Modern design template. EPS10

Eyes on Glass: End to End Monitoring

Organizations’ IT Infrastructure will function best when a continuous set of “eyes” are closely analyzing its health and availability; and proactively identifying the issues that keep the business up and running. What plays a pivotal role in defining an overall IT monitoring...

/ December 10, 2015
Internet Security

An Eye Opening Threat Assessment

You’ll be amazed at what gets uncovered by a security threat assessment and the valuable insight that results. “Wow, we had no idea that was going on in our network!” After performing numerous threat assessments for a variety of organizations, this is...

/ April 23, 2015
Chat icon front of blackboard

E-ZPass Spear Phishing Email Alert

Please be aware of a Spear Phishing email that targets E-ZPass users. The subject line reads “FW: Pay for driving on toll road” and the body of the email looks like this: You have not paid for driving on a toll road....

/ July 28, 2014
The Softer Side of Information Security

The Softer Side of Information Security…

I recently went to a presentation at Norwich University in Vermont. Tom Peters was the speaker. For those of you that don’t know or recall Tom Peters, he is the guy that wrote a book back in 1982 called “In Search of...

/ June 30, 2011
P3 Cubed - Focus on the Basics Part III

P3 Cubed: Focus on the Basics Part III

From my previous discussions on the three P’s – Passwords, Patching and Ports, let’s talk finally about Ports. The Third P – Ports: Open TCP and UDP ports, especially open ports that are not required for business purposes, continue to be something...

/ January 21, 2011
P3 Cubed - Focus on the Basics Part II

P3 Cubed: Focus on the Basics Part II

Continuing from the previous discussion on the most significant areas of technical concern in the area of information security and assurance and the three P’s – Passwords, Patching and Ports, let’s talk next about Patching. 

/ January 21, 2011
P3 Cubed - Focus on the Basics

P3 Cubed: Focus on the Basics

One of the most significant areas of technical concern in the area of information security and assurance is what we have come to call the three P’s – Passwords, Patching and Ports.? Default and weak passwords continue to impact organizations, especially on...

/ January 1, 2011
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...