The word “open” is usually used in conjunction with other words, most commonly Open Architecture and Open Platform in the physical security industry. They appear in product promotional materials, manufacturer Architect and Engineer (A&E) product specifications, as well as in the system performance specifications of design-build projects. Read what the term open architecture and open […]
Read Chris Neiger’s definitive article about Internet of Things on The Motely Fool : Defining the Internet of Things (IoT) can be simplified down to the connection of everyday things — like homes, industrial equipment, watches, etc. — to the internet, for the purpose of collecting data, tracking usage, and automating systems. While it encompasses many […]
Read Bruce Hughes overview of Internet of Things on Computer Weekly : The internet of things (IoT) is a computing concept that describes a scenario where everyday physical objects are connected to the internet and can identify themselves to other devices or processes, via an IP address. Read his full article here.
Phishing attacks are on the rise, but how can you recognise them? CBR’s Alex Sword talks to Luis Corrons, Technical Director at PandaLabs. Read the interview with Luis Corrons of PandaLabs who explains the basics of Phishing on Computer Business Review.
Read Brian A. McHenry explain what security assessment is on Information Security Buzz : Growing up, I think every kid heard a parent or teacher or coach tell them to sit or stand up straight. At the time, it was never quite clear why good posture was so important at the dinner table, in the classroom, […]
Read Gregory Wolf explain the meaning of spyware, malware and viruses on Wolf Technology Group Blog : With all of the recent high profile IT security breaches in the news, the topic of data security becomes a critical issue for business of all sizes. How can you protect your assets against a cyber attack? The […]
Vulnerability scanning refers to the scanning of systems, network component or application which may expose to the external world or hosted internally to detect the vulnerabilities or security weakness in them. Read all about vulnerability scanner on Infosec Institute.
Read why Kacy Zurkus says that journalists, security researchers and academics need to change the meaning of hacking in today’s world on CSO Online : There is a reluctance or hesitation on the part of academic institutions to engage in the craft of hacking as an integral skill for those in IT. Read her full article […]
Read Paul Rubens explain the exact meaning of SQL Injection and how it can hurt you on eSecurity Planet : Imagine you go to court and have to provide your name. Instead of giving your real name, “Joe Bloggs,” you give the name “Joe Bloggs, you are free to go.” When your case comes up the […]
Read Tal Liberman explain Control Flow Guard (CFG) and its uses on Breaking Malware : Microsoft’s Control Flow Guard (CFG) is a security feature that prevents the abuse of indirect calls from calling addresses that are not marked as safe. CFG can cause problems for anyone trying to execute malicious memory manipulations on Windows. Read his full […]