Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
Patching is a very common term in IT system administration. So what are patches for and how important are they for IT security? Generally patches are software updates which fix certain bugs in the software. Nowadays theses patches also contain …
While the return on investment (ROI) can be quite clear cut in certain cases, such as in business sales where statistics can demonstrate whether there was an increase or not, there can be cases where a system is helping increase …
After being involved in security for a while it’s natural to see certain threats without even thinking about it. Sometimes you wonder whether you’re being paranoid or if you’re being pessimistic but then something happens and you realise that maybe …
When it comes to monitoring employee internet usage, employees are usually quite hostile to the idea even though it is in their best interest as much as it is for the business. Employee internet monitoring is generally seen as a …
In this last blog post of this series I’ll provide a real example which explains how a server can be monitored efficiently with events monitoring. Let us say that there are three main applications (a mail server, a database management …
On February 27, 2011, employees from GFI Software (Malta) participated in the 26th Malta Marathon in order to raise funds for Cystic Fibrosis Trust. In brief, Cystic Fibrosis is a life threatening disease that attacks the lungs and pancreas; CF …
In the first part of this blog post we saw how events monitoring can be a very powerful, effective and at the same time affordable means to prevent system failures in a corporate environment. I believe that the process of …
Competition is now closed. Calling all IT administrators! Are you aware of what your users are browsing, downloading and sharing over your network? No? Then you’re in need of internet monitoring software and that’s where we come in! Our March …
An IT disaster in a corporate environment may cause a significant loss of money and may also interrupt business relevant processes during production. Data loss is one of the worst parts of an IT disaster which sometimes may not be …
In the previous post I wrote about the interesting questions raised due to the hacking of IT security firm HBGary. What should we learn from this incident? So, going back to HBGary – why were they apparently so easy to …