Category Archives: Access Control

The Nessus Vulnerability Scanner

In computer security, Nessus is a proprietary comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. For example: Vulnerabilities that allow a … Continue reading

Posted in Access Control, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Test, Threat Management, Web Security | Leave a comment

Cisco Plays Catchup in DPI Test

If you’re a large enterprise with its own network, an ISP, or a company intent on claiming its own, online, the technology force of Deep Packet Inspection (DPI) is with you. But it may surprise you who shows up on the … Continue reading

Posted in Access Control, Cisco, Cloud Computing, Data, Innovation, Larger Enterprise, Manage, Network Management, Network Security, Optimisation, Optimise, Platform (PAAS), Security | Leave a comment

Security At the Edge: Locking Down the Network Perimeter

When securing your company’s network, it’s best to start on the edges — the perimeter — where the system interfaces with the rest of the world. It’s an approach that makes sense. While installing safeguards deep inside the network is … Continue reading

Posted in Access Control, Cryptography, Fortify, Home Security, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Small Business Secure, Tech Tips, Threat Management, Web Security | Leave a comment

Strong cryptography in PHP

If you are a professional web developer, security is an important aspect of your job. If you are planning to store some critical or sensitive data in your web application, like passwords, credit cards, etc, you should use strong cryptography … Continue reading

Posted in Access Control, Cryptography, Network Security, Security, Tech Tips | Leave a comment

Managed Security Services – Good or Bad?

The buzz word “Managed Security Services” sparks off a religious debate among the staunch believers and critics of this rapidly emerging phenomenon in the world of information security. The supporters vehemently profess that Managed Security Services should be considered as … Continue reading

Posted in Access Control, Cryptography, Infrastructure Security, Innovation, Larger Enterprise, Manage, Network Management, Network Security, Reporting, Security, Small Business, Small Business Secure, Web Security | Leave a comment

The Wi-Fi killers

Is your Wi-Fi not working? Interference could be getting in your way What’s the number one threat to the smooth running of your Wi-Fi network? Interference, and plenty of it. It isn’t only interference from neighbouring networks that you have … Continue reading

Posted in Access Control, BT, Data, Home Networking, LAN, Netgear, Small Business, Small Business Communicate, Small Business Connect, Tech Tips, Wireless LAN | Leave a comment

Wi-Fi security luddite? The ICO is coming for you!

The Information Commissioner’s Office today published new guidance for home Wi-Fi security after a YouGov report found that 40% of home users did not understand how to manage the security settings on their networks. The survey also found that in … Continue reading

Posted in Access Control, Data, Home Networking, Home Security, Infrastructure Security, LAN, Network Security, Security, Wireless LAN, xDSL Technology | Leave a comment

How to recognise security vulnerabilities in your IT systems

As IT systems continue to extend across multiple environments, IT security threats and vulnerabilities have likewise continued to evolve. Whether from the growing insider threat of rogue and unauthorised internal sources, or from the ever increasing number of external attacks, … Continue reading

Posted in Access Control, Business Integration, Cloud Computing, Critical Infrastructure, Fortify, Infrastructure Security, Intrusion, Network Security, public cloud, Resilience, SCADA, Security, Small Business Secure, Software (SAAS), Test, Threat Management | Leave a comment

An examination of DHCP Snooping with option 82 on Cisco.

DHCP snooping is a DHCP feature that provides security by filtering untrusted DHCP messages from hosts or other devices on the network. DHCP snooping accomplishes this level of security by building and maintaining a DHCP snooping binding table. An untrusted … Continue reading

Posted in Access Control, Cisco, Data, Home Security, Infrastructure Security, Intrusion, LAN, LAN Switching, Network Security, Physical Security, Security, Small Business Secure, Tech Tips, Threat Management | Leave a comment

Hackers hit ‘at least five oil and gas firms

A report compiled by security firm McAfee, has revealed that hackers have run rampant through the networks of at least five oil and gas firms for years. The hackers exploited weaknesses by means of a combination of con tricks, computer … Continue reading

Posted in Access Control, Critical Infrastructure, Infrastructure Security, Intrusion, Network Security, SCADA, Security, Threat Management, Web Security | Leave a comment