Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
A SysAdmin has an almost endless list of tasks they must complete on a regular basis. Some are so routine that they can be done while multitasking, others require careful attention to detail and a laser-like focus to ensure that …
How much money does your organization spend on security? No matter how large that figure is, could you be without it? Probably not! The truth is that many organizations put up with security applications hogging resources, demanding constant attention and …
I came across two stories recently that made me wonder what the outcome would be if they were seen in parallel. The first, reported by Wired.com, showed how, despite being repeatedly told about the importance of security, people seem to …
Back in the 1980s, there was a TV series in the United States called Growing Pains, about a typical suburban American family experiencing change and how they coped (or didn’t cope!). In the show, the parents constantly juggled responsibilities and …
Lifestyles and work styles have changed. I mean, when was the last time you wrote a letter by hand, or used a pay phone? Does anyone remember the days of typewriters, real carbon copies and rooms full of bulky filing …
Windows PowerShell is a powerful (no pun intended!) command line scripting language built on top of the .NET framework. Version 2.0 of Windows PowerShell comes installed by default with Windows 7 and Windows 2008 R2. On older platforms, it is …
GFI MailArchiver® 2012 was launched today with powerful new reporting capabilities to guard against data leakage of sensitive information, such as social security and credit card numbers, as well as an alert and reporting system that identifies employee correspondence related …
Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!
Before you panic, remote workstation monitoring is not something born inside secret NSA labs. Rather it is a reflection of changing working environments, and how system administrator roles must adapt to that. Let’s face it; workplaces are simply not the …
The two most common actions after companies had a security incident are patching of vulnerable software (62.3%) and the patching or remediation of vulnerable hardware or infrastructure (49.3%), according to the CSI Computer Crime and Security Survey. Would-be exploiters rely …