Archive | February, 2011

Benefits of Data Classification

Data Classification has been around for many years. As companies increasingly open their information networks to external collaborators, move to collaborative environments like SharePoint, and face increased legal exposure, Data Classification is increasingly being deployed as an effective means to help address risks and enable compliance. Quite often when the subject of Data Classification comes […]

Continue Reading

Why does Web App Security continue to stink?

Everyone and every company has a web site now a days. Some are professionally done, some are made from DIY kits provided by the hosting provider and some are done from scratch by someone who claims to know what they are doing. It doesn’t seem to matter who built the site most all of them […]

Continue Reading

You say false positive, I say tell me anyway

One of my favorite people on the intertubes is Shrdlu. I’ve enjoyed reading her enlightening and somewhat amusing posts for quiet a while and have bantered back and forth with her on Twitter many a time. She was even the first interview that we Martin did on the SFS podcast back in January of last […]

Continue Reading

How to Compare Server Online Backup and Recovery Service Providers

IT professionals are increasingly looking to online backup and recovery (or “cloud storage”) services when it comes to server data protection. These solutions are especially relevant for small to medium-sized businesses and for the remote offices of larger enterprises. But with all the choices today, how do you decide what is right for your company? […]

Continue Reading

Advanced Persistent Threat (APT)

Introduction APT, formerly known as the Advanced Persistent Threat, is the buzzword that computer security specialists and everyone else is using. Companies are concerned about it, the government is being compromised by it and computer security specialists are using it in every presentation they give. One of the main reasons organizations are broken into today […]

Continue Reading

Hey! You! Get off of my cloud!

Push any app or service you want out to the cloud, but keep your security close and require your service providers to use one of the standards based methods to authenticate your users against your Active Directory.

Continue Reading