Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

20 Tricky SysAdmin Tasks… And How to Approach Them

on August 20, 2012

A SysAdmin has an almost endless list of tasks they must complete on a regular basis. Some are so routine that they can be done while multitasking, others require careful attention to detail and a laser-like focus to ensure that …

7

5 Ways to Measure the Worth of Cloud-based Security [VIDEO]

on August 17, 2012

How much money does your organization spend on security? No matter how large that figure is, could you be without it? Probably not! The truth is that many organizations put up with security applications hogging resources, demanding constant attention and …

0

Keeping Up with the Times

on August 16, 2012

I came across two stories recently that made me wonder what the outcome would be if they were seen in parallel. The first, reported by Wired.com, showed how, despite being repeatedly told about the importance of security, people seem to …

0

Experiencing Growing Pains? Head for the Cloud

on August 13, 2012

Back in the 1980s, there was a TV series in the United States called Growing Pains, about a typical suburban American family experiencing change and how they coped (or didn’t cope!). In the show, the parents constantly juggled responsibilities and …

0

It’s All On-The-Go: Access to Archived Email Anytime, Anywhere, from Any Device

on August 9, 2012

Lifestyles and work styles have changed.  I mean, when was the last time you wrote a letter by hand, or used a pay phone? Does anyone remember the days of typewriters, real carbon copies and rooms full of bulky filing …

0

Windows PowerShell: Extracting Strings Using Regular Expressions

on August 8, 2012

Windows PowerShell is a powerful (no pun intended!) command line scripting language built on top of the .NET framework. Version 2.0 of Windows PowerShell comes installed by default with Windows 7 and Windows 2008 R2. On older platforms, it is …

4

GFI MailArchiver® 2012 Launched Today!

on August 7, 2012

GFI MailArchiver® 2012 was launched today with powerful new reporting capabilities to guard against data leakage of sensitive information, such as social security and credit card numbers, as well as an alert and reporting system that identifies employee correspondence related …

2

August Webcasts

on August 6, 2012

Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!

0

3 Reasons to Keep External Employees Internally Controlled

on August 3, 2012

Before you panic, remote workstation monitoring is not something born inside secret NSA labs. Rather it is a reflection of changing working environments, and how system administrator roles must adapt to that. Let’s face it; workplaces are simply not the …

0

Addressing the Exponential Growth in Network Vulnerabilities

on August 1, 2012

The two most common actions after companies had a security incident are patching of vulnerable software (62.3%) and the patching or remediation of vulnerable hardware or infrastructure (49.3%), according to the CSI Computer Crime and Security Survey. Would-be exploiters rely …

0