The Gist: Check Point Software Technologies researchers discovered a critical RCE (remote code execution) vulnerability in the Magento e-commerce...
Archive for category: Security Tech
With security breaches in the news almost daily, businesses are becoming increasingly aware, and wary, of their own vulnerability....
Those recordable CDs and DVDs you’ve burned precious data on from the 80s and 90s might be empty discs...
Affant Announces Network Monitoring Upgrade
, Boring Tech, Security Tech, Intrusion Detection System, IT Security, managed security service, Managed Services, Network monitoringCheck out the latest press release on the launch of our upgraded AffantWatch Network Monitoring System – October 2011 “Affant Communication...
Security Policy, Network Security, And Desktop Security
, Security Tech, Backups, data, DNS, Firewalls, Intrusion Detection System, network security, remote access, security, server event/sys logsOk, we have all heard them, oxymorons, that is, adopted phrases that seem to describe something but use two...
IPv6…All That You Know Is At An End…
, Security Tech, DHCPv6, DNS, echo request exploits, ELE, ICMP and multicast, IPv4, IPv6 IPv4 networks, IPv6 tunnels, IPv6 vulnerabilities, mandatory IPSEC, multicast, NDP, Network Advertisement, Network solicitation, QoS, Type 0 routing, VoodoonetAll that you know is at an end… – Silver Surfer No Soup for YOU! At a ceremony held on...
Cloud Security: Mission Impossible?
, Cool Tech, Security Tech, Amazon, architecture, Backups, challenges, Cloud, Cloud Computing, Cloud Security, data, Disaster Recovery, economic, Firewalls, Google, Host IDS monitors host, Intrusion Detection System, political, SAS 70 audit, security, server event/sys logs, SSAE 16, SunGuard, technical, troubleshootingWith today’s challenges, technical, economic, political, or otherwise, our brave IT Mangers stand at the precipice of a new...
It’s A Trap!: Fallacies of Managed Services
, Boring Tech, Security Tech, managed service, Managed Services, monitoring, msp, network securityIn a galaxy far far away… Information Technology day to day operational transactions have been the force behind the...