Mcafee and Trendmicro
Is it a good idea to have 2 antivirus programs installed on the same computer. I have heard from various people that it is not, and other people have said its not a big deal.
View ArticleWhich SSL certificate is better ?
I am confused.... I have purchased more than 5 SSL certificates this year alone for different application servers and i have used comodo and thawte from namecheap.com. it is the time for Exchange...
View ArticleI want to setup a security system in my house
I want to setup a home security system. I want to install 2-4 Cameras, over IP so I can view remotely. I have an iMac from late 2007 that I want them all to connect to and store the recordings. How...
View Articlemultiple Dvr server
I have 6 DVRs across the property, each one controls one building. They are attached to the guest LAN on a separate network scheme. I am trying to find a software that will allow me to stream the data...
View ArticleExchange OWA versus ActiveSync on personal devices - differences?
I've just rolled out Exchange 2010. I've a policy that if people want to use ActiveSync on their personal phones, then they must have MDM installed and agree that I have the power to remote wipe their...
View ArticleBest way to deliver passwords to remote users?
For setting up users at remote offices, what's the best way to deliver their password to them? Email is plain-text. Text messages and phone calls seem better, or can the carrier get the password just...
View ArticleFree Webcast: 3M Privacy Filters @ SC Magazine's eSymposium 9/12/13
Join 3M CISO, Jim Garrett, to learn how he keeps up with the demands of 3M's mobile workers without compromising his overall corporate security strategy. During his session at SC Magazine's...
View ArticleSecurity, or absence of. List the flaws here.
I started keeping track of websites and applications that don't really get security and other things that got me a little fired up and I figured I'd post at least the security types. There's several...
View ArticleConsidering Bit9, thoughts from those using it?
We are currently evaluating Bit9 to replace SEP and I was wondering if those that are actually using it have any feed back for us. So we are looking to see if there was something on the market that...
View ArticleImpending Cyber Doom
We all watch the news and hear what is going on around the world with wars that cross over physical borders and we count the mortal losses of countries, But what about on the virtual front?Are we...
View ArticleI want to block countries or continents out on my network...
I've done a lot of reading on the web about this and I've come up with nothing but the same old way I've been doing this. Manually entering ranges or Network/CIDR and this is getting old. Is there any...
View ArticleHourly Cost of Security Downtime Survey - Win $500 Amazon Cert
KnowBe4 and ITIC’s joint 2013-2014 Hourly Cost of Security Downtime Survey is live! The survey polls organizations on the cost of hourly downtime associated with security outages as well as the...
View ArticleI'm closing my bank account
I was recently informed by my bank that they will be upgrading their web services. Excellent, that's a good idea. Also, the web site will be down for a brief period. No problem, that sort of thing is...
View ArticleData Breach? You WILL Be Sued...
It's almost 10 years ago that the first big data breach happened. That was data broker ChoicePoint and 160,000 consumer records were stolen. Dan Kaplan at SC Magazine had a long article about the...
View Articleanyone know of a good free program that will play zoom and capture dav files
anyone know of a good free program that will play zoom and capture dav files these are security videos from a network dvr with linux software..
View ArticleWhat are you using to encrypt GUID partitions?
So up to now, I've been encrypting all our laptops with TrueCrypt. Yesterday I received a new laptop that has a GUID partition table, which as you know is not a new technology. However, TrueCrypt only...
View ArticlePassive Web Vuln Scanner
Good morning Spiceheads, I am in need of a passive web vulnerability scanner. I am currently completing a masters thesis that has to do with cyber espionage (did you cringe at the word cyber? yeah I...
View ArticleHow Secure it bitlocker?
How secure is Bitlocker as in how hard would it be to brute force the bitlocker encryption key? I know that by default it uses a AES 128 BIT key, but because of the way it is implemented I have doubts...
View ArticleAnyone going to the SANS conference in Las Vegas in a week and a half?
Not sure if this is a faux-paus to ask this here but I am going to the conference and was wondering what courses, if any, that you guys/gals may be going to. Have an amazing rest of your Thursday!!
View ArticleWhat do enterprises really need in a mobile security solution?
With all of the competing mobile security offerings out there and the related acronyms, I am doing an informal poll as far as what enterprises really NEED in a mobile security solution? What are some...
View Article