5 Steps to Secure & Affordable Video Conferencing for SMBs
June 24, 2013STEP #1: Get the Setup right You will need the following in your meeting room: 1x TV or Video Projector 1x…
Read MoreSecurity considerations in Small and Medium Enterprises (SMEs)
June 27, 2012When comparing SMEs and Large Enterprises on Security, one element is found to be common to the two: They both utilize…
Read MoreDeathmatch: Private vs. Public Cloud
May 30, 2012In one of my previous posts, I discussed the security issues encountered in public clouds. Three years after, the same security…
Read MoreAchieving Physical Security in 5 Steps
April 2, 2012We’ve all experienced these: Theft of a laptop or other portable device in a supposedly secured environment, theft of a server…
Read MoreThe Truth behind Zero-Day Attacks
April 7, 2010Zero-Days attacks represent the most frightful nightmares of all security concerns out there in the world. But first, let’s put a…
Read MoreSecurity in the Cloud -Should it be trusted?
November 27, 2009Cloud Computing! The acclaimed next-generation way of computing offers many benefits indeed. Leveraging both P2P (Peer-2-Peer) and Online collaboration technologies, Cloud…
Read MoreWhat Windows Server 2008 R2 Hyper-V is missing!
October 15, 2009For anyone out there who’s had his hands full at playing around with NAP (Network Access Protection), it was a joy…
Read MoreSecurity Match: Technology Vs. Attitude
August 21, 2009As technology evolves, more and more defense techniques are brought forth in the eternal battlefield that is the Internet. From Firewalls…
Read MoreThe Must-Have InfoSec Tools
June 15, 2009Hello Everyone, My last post was kind of a long winded one! A few years ago, i came across one of…
Read More10 Steps Defense-in-Depth
April 29, 2009Judging by this year’s “Infosecurity Europe 2009″ event attendance at Earl’s Court, London, it becomes clear that despite the downturn economy,…
Read More