SecurID Suffers Data Security Breach

RSA, one of the pioneering companies of information security and the creator of SecurID technology in use by thousands of …

Openfire XMPP Chat Server: migrating from windows to linux demystified

Most other chat protocols/services do not use TLS/SSL or it’s optional and off by default, and thus it’s a low-hanging vector for data breach and leakage.

Auto makers have some work to do securing passive keyless entry and start systems

For as little as $100, equipment can be obtained off-the-shelf and configured to sniff the codes used by these automobile systems.

How to avoid having your bank account drained

The only true defense is behavior: not clicking, not opening, etc.

your best offense: a solid defense

your best offense: a solid defense

In the words of some great football coach, your best offense is a solid defense. And so it goes with computer systems security…

your datacenter, your software as a utility

your datacenter, your software as a utility

By ‘utility’ we mean you get all the benefits of the service, without investing in and maintaining the infrastructure.

Hacktivists and ‘the Professionals’ should make 2011 quite interesting

From Hacktivists to ‘the Professionals’, DDoS attacks are a major tool. And detailed DDoS discussion:

2011: expect more of using social media for hacktivism

2011 will be the year of using old attack vectors in new web 2.0 ways. DDoS with social media? Browser-only …

Top 20 passwords found in the Gawker dump

Interesting list of top 20 passwords in the Gawker dump. Hope you aren’t registered on any lifehacker/gawker sites!!

security solutions

security solutions

We provide solutions that secure your data and infrastructure using multiple layers of industry standard tools.