Tech Zone

Page 2

The Secret Question Threat

At its core, security is all about allowing convenient access to a system for all those who have legitimate access to it. Yet, at the same time, that convenience, in turn, also creates security risks.

Continue reading

61 network security twitter feeds to follow

Information security pros abound on Twitter. While not all of their tweets may be 100% focused on InfoSec, we’ve picked 61 network security Twitter feeds we think are worth following.

Continue reading

Software vulnerabilities: Only half the story

Intermediary devices such as routers and WAPs can be targeted by attackers. The latest example is an exploit that takes aim at a security vulnerability in routers made by a number of popular vendors, including D-Link, ZTE and TP-Link.

Continue reading

Security 101: Authentication (Part 1)

In this post, we’re going to look at the first of the three As: Authentication. We’re going to focus on authentication as confirming a user.

Continue reading

Can you secure your keep?

In how many ways can one of your network’s hosts become compromised? Well, according to independent security testing company The AV-TEST Institute, somewhere north of 300 million.

Continue reading

Introduction to permissions, Part 4: Troubleshooting permissions and best practices

In the last part of our Permissions series, we’ll look at troubleshooting permissions and some best practices.

Continue reading

57 technical terms that all true geeks should know

Every culture and trade has its own secret language known only to the initiates, but in today’s post we’re going to look at 57 of the oddest/strangest/most obscure terms we use in what, to us, is everyday language.

Continue reading

Security 101 – physical security

Your staff travelling with company IT resources should be aware of their surroundings and take basic precautions to safeguard the equipment and data in their care. Here are some of these basic physical security best practices.

Continue reading

Two steps forward and one step back: Why do tech companies always break some key functionality in their new and improved devices?

Why do brand new models of tech devices or entirely new versions of software so often seem to take two steps forward and then one step back, removing important features or even adding serious problems that weren’t in the previous versions

Continue reading

You have the right to remain silent online

Some say there’s no longer such a thing as privacy, and to an extent, that’s true. But there are still ways to minimize the chance that the information that’s “out there” will end up hurting you.

Continue reading

Find us on Facebook

Follow us on Twitter