Passwords on spreadsheets put client networks at risk, along with Managed IT service providers’ credibility and trustworthiness. Managed IT Service Providers (MSPs) deliver a variety of...
Fully Controlled and Closely Monitored Remote Access, a Critical Aspect of DCIM
Without proper data center remote access management, administrators invite security issues and waste time. With more organizations adopting cloud computing and virtualization, data center operations...
The Heartbleed Bug: How to Mitigate Risks with Better Password Management
– – – – – – – – – – – – – – – – – – – – – – – – –...
Will passwords become obsolete soon?
Will passwords soon become a thing of the past? Have they already become obsolete? This is perhaps one of the most prominent topics under discussion...
PCI-DSS 3.0: The Stress on Password Protection & Security [Part-2]
[In the previous post, we briefly discussed the requirements proposed for PCI-DSS 3.0. In this post, we’ll discuss the requirements in depth.] When a customer...
PCI-DSS 3.0: The ‘Security Path’ to Compliance
Security and compliance are often used synonymously, even by techies. You can ensure compliance by remaining secure; but mere compliance with certain rules and regulations...
5 Top Targets for Today’s Hackers
Black Hat USA bills itself as “the show that sets the benchmark for all other security conferences.” While most conferences tend to over-promote themselves, given the...
Spate of shocking cyber attacks on universities jolt academia
It is hauntingly clear – cyber criminals have set their eyes firmly on universities, research institutions, and centers of higher learning in the United States...
Your Net Worth Is Online – And Less Safe Than Ever
The Black Hat USA 2013 conference, which kicks off tomorrow in Las Vegas, brings together the brightest minds in IT security each year — those who are...