Latest posts

Page 11

The ten immutable laws of security administration revisited

Welcome back to our series for people looking to break into the Infosec field or just learn more about information security: The security 101 series.

Continue reading

If you keep it, encrypt it

Whether it’s on the local hard drive of the server or stored on a laptop or the USB key they filch when you’re not looking, data is worth its digital weight in gold!

Continue reading

Passwords: Making the most of a necessary evil

I’m not sure how many of us like complex passwords, multiple complex passwords, or the fact they need to be changed so often but having your password cracked can have very serious consequences

Continue reading

Monday tech roundup – From Amazon scouting the kids’ market to the wearable tech security threat

Autumn is just around the corner and Amazon is already thinking of the ultimate entry on every child’s Christmas list with their recently announced Fire Kids Edition tablet.

Continue reading

Minority Report: In Support of Scary Technology

There is a lot of sentiment that’s been building over the past years against all sorts of technology that is perceived to be taking away all of our privacy.

Continue reading

Auditing in Exchange: I didn’t do it. Nobody saw me do it. You can’t prove anything

Administrator audit logging records any action, based on an Exchange Management Shell cmdlet, performed by an administrator.

Continue reading

Is the oversized iPad another half-hearted enterprise push?

There was the usual hype leading up to Apple’s Keynote event last week and many were expecting Apple to take a serious stab at the enterprise market as their next evolutionary step.

Continue reading

Is revenge a dish best served digitally?

Digital Revenge…it sounds like the premise for a Michael Crichton or James Patterson novel, or perhaps a bad reality television show, doesn’t it?

Continue reading