Member in the “Alliance for Cyber Security”
I am officially in the page of participants of the Alliance for Cyber Security. Click on the image to see the list: Look who is before and after me. I would say that I am in good company, right? 🙂
I am officially in the page of participants of the Alliance for Cyber Security. Click on the image to see the list: Look who is before and after me. I would say that I am in good company, right? 🙂
I have finally found the time to make the app I always wanted to have for the “IT Security News” service. Here is the page on Google’s Play Store: And the screenshots of the app: Right now it is available only on Android devices, soon it will be available in the […]
Network Access Control, is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement. When a computer connects to a computer network, it is not permitted to access anything unless it complies with a business defined […]
I ended part 2 with the promise that we will discuss about : 2) Intrusion detection and prevention systems (IDS/IPS or IDPS) From Wikipedia: Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion […]
I wrote in the first part of this article about Detection, Protection, Remediation and I stopped at the part where we analyze what kind of security products do you need in the car of tomorrow. 1)The classical antivirus We know it to be used mostly for files. But it can much more than that. a) Files There are […]
I didn’t actually want to write such a post, but several press releases drew my attention. So, the competition to protect the car has begun. Big players are now on the hunt for customers. But, when you talk to customers like Daimler, VW, BMW, Nissan and others, the discussions will take a while. I will maintain the list […]
Note: This is going to be a somehow longer article which I will finish in a couple of related posts. A security product is a program that Prevents that malware enters the system Detects if previously unknown malware is running on the system Remediates the actions of detected malware on the system Note that it […]
Short story: It is a waste of time and money, possibly even a scam! Long story: There are lots of ways to lose your money in this world, but here’s one I never thought before: binary option Web sites. But, what the hack is “binary option trading”? Don’t need to read all. I marked with […]
I wrote before about Pentesting in the article “What is Pentesting, Vulnerability Scanning, which one do you need?” . If you’re a company having web services of any kind or a kind of backend, you are asking yourself if you should only do pentesting or make things right and do the entire risk assessment and threat […]
OneDrive’s only advantage in comparison to Dropbox, GDrive and others were: 15 GB of space (OK, Google offers the same, but for all your data, including photos and email) Availability on all types of devices through apps (also non Microsoft) Now, they reduced the space 3 times ! Starting July 27 you get only 5 […]
You must be logged in to post a comment.