Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: Emmanuel Carabott

Keeping Up with the Times

Keeping Up with the Times

on August 16, 2012

I came across two stories recently that made me wonder what the outcome would be if they were seen in parallel. The first, reported by Wired.com, showed how, despite being repeatedly told about the importance of security, people seem to …

Read the Full Story
0
Is Exchange Anti-Spam Enough?

Is Exchange Anti-Spam Enough?

on May 23, 2012

We all know the importance of network security, yet it is also necessary to strike a balance between its costs and its benefits. This is not easy and there is no golden rule here, with the golden ratio being different …

Read the Full Story
5
When You Become the Enemy

When You Become the Enemy

on May 17, 2012

Malware is distributed in a number of ways. Many web attackers focus their efforts on attracting potential victims to visit malicious sites and, to prevent this from happening, a lot of organizations restrict employee access to reputable sites only. Hackers, …

Read the Full Story
4
European Legislation Might Outlaw Security Tools

European Legislation Might Outlaw Security Tools

on April 13, 2012

In a recent post I had outlined my concerns about the Anti-Circumvention rules imposed by ACTA. I had suggested that as a result, legislation could in future be such that using certain tools required by the security profession – which …

Read the Full Story
4
You’ve got All Your Security Technologies in Place… Now What?

You’ve got All Your Security Technologies in Place… Now What?

on April 5, 2012

Antivirus and firewall solutions? Check! Regular vulnerability scans and patch management? Check! Web security software? Check! Security thinking? Ch-e…what? When we think about security we automatically think in terms of software. Without a doubt, these solutions are a must to …

Read the Full Story
3
Is Your Deception Defense Strong?

Is Your Deception Defense Strong?

on April 2, 2012

April Fools is a whole day dedicated to the art of deception. Newspapers run spoof stories, pranks are pulled and the world generally does its best to tickle its collective funny bone. For that one day, that brief 24 hours, …

Read the Full Story
2
Danish Police Incident Calls for a Security Assessment

Danish Police Incident Calls for a Security Assessment

on March 22, 2012

A department responsible for IT Security should, obviously, follow those practices it expects others to follow. Sometimes you come across situations where tasks that should fall under an IT security umbrella are handled by an external department which might not …

Read the Full Story
4
How to Protect Your Network against DDoS Attacks

How to Protect Your Network against DDoS Attacks

on February 21, 2012

The last thing an administrator wants to deal with is a Distributed Denial of Service (DDoS) attack. Yet, together with the recent rise of hacktivism,  DDoS attacks are increasingly becoming a threat that IT admins need to prepared for. Just …

Read the Full Story
5
ACTA and the Anti Circumvention Clause

ACTA and the Anti Circumvention Clause

on February 16, 2012

This citation concerns you: “Each Party shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors, performers or producers of phonograms in connection with exercise of their rights in …

Read the Full Story
7
Troubleshooting Information Overload

Troubleshooting Information Overload

on January 6, 2012

Let’s face it; most of us in IT spend entirely too much time in firefighting mode. We talk a great game about being proactive, and keeping ahead of issues; monitoring our systems for utilization and capacity so we can schedule …

Read the Full Story
5