Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
When it comes to IT, simple mistakes can cost you big time. Whether that is immediately or not depends on a number of factors, and sometimes, when something has gone incredibly wrong, you won’t even realize that the root cause …
In a recent post I had outlined my concerns about the Anti-Circumvention rules imposed by ACTA. I had suggested that as a result, legislation could in future be such that using certain tools required by the security profession – which …
Even if you’re living on a beautiful sunny island in the middle of the Mediterranean Sea, Monday blues can hit you – especially after a holiday weekend. But that wasn’t the case for the GFI Malta team whose morning was brightened up …
Antivirus and firewall solutions? Check! Regular vulnerability scans and patch management? Check! Web security software? Check! Security thinking? Ch-e…what? When we think about security we automatically think in terms of software. Without a doubt, these solutions are a must to …
Here at GFI we try to share all the information you need on the latest technologies. This month, we’re offering all the following FREE webinars – have a look and see what best suits your needs!
April Fools is a whole day dedicated to the art of deception. Newspapers run spoof stories, pranks are pulled and the world generally does its best to tickle its collective funny bone. For that one day, that brief 24 hours, …
Using Exchange Server in a non-Windows enterprise environment can be a tricky, yet unavoidable situation for some organizations. In this post I will highlight some of the best methods you can apply to integrate Exchange Server in a non-Windows environment.
In all my years of involvement with the fax server software industry, telephone systems, a plethora of industry sectors, and small to enterprise business in general, I cannot remember one person ever telling me they love to fax. So why …
As your organization grows, so do mailboxes and, with them, storage requirements. You will therefore need to make some scalability tweaks and design considerations in accordance with this growth. In this post I shall outline the best Exchange Server 2010 …
A department responsible for IT Security should, obviously, follow those practices it expects others to follow. Sometimes you come across situations where tasks that should fall under an IT security umbrella are handled by an external department which might not …