Latest posts

In the tech industry, timing is everything

There are many other aspects that contribute to whether a company’s offering with be a big success or a dismal flop, but whether or not the time is right seems to be the most important of all.

Continue reading

Introduction to permissions, Part 3: Application Permissions

In Part 3, we are going to look at application permissions. This is a pretty broad topic, but there are some generic permissions that are relevant across most models.

Continue reading

Oh, there’s no place like home for the holidays

Here are 21 tools for sysadmins to keep close by to help you resolve any pesky issues that will come your way while at home and get back to enjoying your hard-earned rest.

Continue reading

Customer to tech companies: Stop abandoning your babies

Discontinuation of a trusted product feels like a betrayal, and there’s a good chance that customer will think twice before investing money and time in one of that company’s products again.

Continue reading

Introduction to permissions, Part 2: File system permissions

In Part 2, we’re going to look at how Windows and the *nix operating systems (Linux, Unix, and Macs) deal with file system permissions.

Continue reading

December 2014 – Microsoft Patch Tuesday

Microsoft’s December Patch Tuesday brings us seven new security bulletins that include fixes to address five remote code execution vulnerabilities, one elevation of privilege vulnerability and one information disclosure vulnerability.

Continue reading

Android – The new battleground for software vulnerabilities

With over 1 billion Android devices activated, the platform’s popularity has inevitably caught the attention of malware creators. In some cases, mobile phones pose a greater security risk than a desktop computer.

Continue reading

30 things to do to secure your network now!

Discover the top 30 things you can do without having to spend your entire IT budget, hire expensive consultants, or retool your network, to improve your network’s security.

Continue reading

Introduction to permissions

In this new mini-series we’re going to take a look at how to troubleshoot permissions. To start, let’s take a step back and discuss what permissions are, the various models, types of accounts that are affected, and the principle that should drive all permission-setting: least privilege.

Continue reading

Cyber-Insurance: Is it necessary? Should it be mandatory?

Should businesses consider buying cyber insurance or is it yet another insurance that’s unnecessary?

Continue reading