Organizations host file servers to store critical data to and valuable information about its business, customers, and employees. Access to file servers is authorized only for a few trusted users, but but if any of them turns out to be a malicious intruder, how can we detect and track his or her suspicious activities? The answer is file server configuration change auditing.
LepideAuditor for File Server is a solution for auditing all Windows file servers and NetApp filers in your network.
Read more here.
Anyone running a Windows computer knows how important it is to have good anti-virus software—but you don’t need to pay for good protection! If someone you know still doesn’t have anti-virus software running, here’s a quick guide you can send them to help them set it up – recommendations for quality free anti virus software.
A new whitepaper has been released by Taia Global which claims that Russian hackers “also breached Sony” and “those hackers still have access to Sony’s network.”
Continue reading “Russians hacked Sony? The saga continues…”
Cloud Security is one of the buzzwords in the industry today. But, what does it mean? Are there new kinds of threats with the cloud?
Continue reading “Cloud Security – An Overview”
A new Day Zero vulnerabilty in nearly all versions of IE has been discovered and announced publicly by FireEye, a security company.
Continue reading ““Clandestine Fox” eats Windows XP”
There are many candidates for this prestigious post but one of the most deserving is Windows XP. When XP and Windows 8 are hit with the same number of malwares, the infection rate of XP is much higher than that of WIndows 8 – maybe even 5-6 times higher.
Continue reading “Weakest link the in Security Chain – Windows XP?”
Examining data from one million devices, Fiberlink, a mobile management firm, examined the often forgotten part of mobility in the workforce — laptops. While IT and security vendors focus on Google’s Android, Apple’s iOS, tablets, and smartphones, Lenovo’s ThinkPad and Dell’s Latitude chug along, remaining a stable fixture in the workplace. According to Fiberlink, almost 50 percent of the laptops observed in their study are running Windows XP.
Read the full article at Network World
We had already gone through how virtualization works and the benefits it provides in an earlier blog, ‘Server Virualization Simplified’, in June 2011. Now let us find out how to secure a virtualized environment. Continue reading “How to secure a virtualized environment?”
One of the main principles of security is accountability. There are some problems associated with accountability, such as the difficulty in determining the security relevance of each user action. Another problem is searching through the collected data to find meaningful information.
Continue reading “Auditing in Solaris”
Linux is considered a very safe OS. This is mainly because there are more Windows machines than Linux boxes. For hackers it makes more sense to attack a wider population to get better results. As a result Linux has been spared of widespread virus attacks. This does not mean Linux has bullet-proof safety against viruses. The following table lists some linux viruses which necessiates administrators to consider anti-virus measures to be implemented. Continue reading “Is Anti-virus software needed for Linux?”