With Halloween fast approaching, the search for the scariest costumes is underway. But as an IT security professional, what haunts you more? Coworkers dressed as ghosts, witches, and vampires? Or the thought of a cyberattack? October may be...
Is Google Sync a vector for data breaches?
Many users enable Google Sync so they can use one Google account for both personal and business purposes. Google Sync synchronizes bookmarks, browsing history, passwords, and extensions across Chrome browsers...
Five worthy reads: The human factor in IT team and organizational success
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we take a look...
There’s more to password security than hashed passwords
In 1967 Roger Needham, one of the first computer scientists to emphasize the need for computer security, invented the method of storing a hashed version of plaintext passwords. To this day, we...
Five worthy reads: Is your business safe from business email compromise?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the rising...
Secure access to multiple enterprise applications! ADSelfService Plus makes it twice as safe.
Enterprise applications have become an integral part of a tech user’s life. Although the utility and user experience of these applications have been getting better, the risk...
Simplifying security auditing, Part 4: Securing web servers
Web servers are front-end facing applications that are vital for the daily operations of businesses. They are subject to attacks such as SQL injection, malicious URL...
Five worthy reads: Rise of the no-collar culture
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we look into the...
Ghostscript vulnerability leaves enterprises waiting for a security patch
It often feels like there’s no end to software vulnerabilities and exploits. With every step towards technological advancements, another threat turns up. This is especially frustrating for enterprises,...