This post is a reproduction of an article I wrote that was originally published in Business Computing World. “When you play the Game of Thrones, you...
Why MSPs Should Take Extra Care in Managing Client Passwords
Passwords on spreadsheets put client networks at risk, along with Managed IT service providers’ credibility and trustworthiness. Managed IT Service Providers (MSPs) deliver a variety of...
Fully Controlled and Closely Monitored Remote Access, a Critical Aspect of DCIM
Without proper data center remote access management, administrators invite security issues and waste time. With more organizations adopting cloud computing and virtualization, data center operations...
The Heartbleed Bug: How to Mitigate Risks with Better Password Management
– – – – – – – – – – – – – – – – – – – – – – – – –...
Will passwords become obsolete soon?
Will passwords soon become a thing of the past? Have they already become obsolete? This is perhaps one of the most prominent topics under discussion...
PCI-DSS 3.0: The Stress on Password Protection & Security [Part-2]
[In the previous post, we briefly discussed the requirements proposed for PCI-DSS 3.0. In this post, we’ll discuss the requirements in depth.] When a customer...
PCI-DSS 3.0: The ‘Security Path’ to Compliance
Security and compliance are often used synonymously, even by techies. You can ensure compliance by remaining secure; but mere compliance with certain rules and regulations...
5 Top Targets for Today’s Hackers
Black Hat USA bills itself as “the show that sets the benchmark for all other security conferences.” While most conferences tend to over-promote themselves, given the...
Spate of shocking cyber attacks on universities jolt academia
It is hauntingly clear – cyber criminals have set their eyes firmly on universities, research institutions, and centers of higher learning in the United States...