Category Archives: Infrastructure Security

The Nessus Vulnerability Scanner

In computer security, Nessus is a proprietary comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. For example: Vulnerabilities that allow a … Continue reading

Posted in Access Control, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Test, Threat Management, Web Security | Leave a comment

Security At the Edge: Locking Down the Network Perimeter

When securing your company’s network, it’s best to start on the edges — the perimeter — where the system interfaces with the rest of the world. It’s an approach that makes sense. While installing safeguards deep inside the network is … Continue reading

Posted in Access Control, Cryptography, Fortify, Home Security, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Small Business Secure, Tech Tips, Threat Management, Web Security | Leave a comment

Managed Security Services – Good or Bad?

The buzz word “Managed Security Services” sparks off a religious debate among the staunch believers and critics of this rapidly emerging phenomenon in the world of information security. The supporters vehemently profess that Managed Security Services should be considered as … Continue reading

Posted in Access Control, Cryptography, Infrastructure Security, Innovation, Larger Enterprise, Manage, Network Management, Network Security, Reporting, Security, Small Business, Small Business Secure, Web Security | Leave a comment

Wi-Fi security luddite? The ICO is coming for you!

The Information Commissioner’s Office today published new guidance for home Wi-Fi security after a YouGov report found that 40% of home users did not understand how to manage the security settings on their networks. The survey also found that in … Continue reading

Posted in Access Control, Data, Home Networking, Home Security, Infrastructure Security, LAN, Network Security, Security, Wireless LAN, xDSL Technology | Leave a comment

How to recognise security vulnerabilities in your IT systems

As IT systems continue to extend across multiple environments, IT security threats and vulnerabilities have likewise continued to evolve. Whether from the growing insider threat of rogue and unauthorised internal sources, or from the ever increasing number of external attacks, … Continue reading

Posted in Access Control, Business Integration, Cloud Computing, Critical Infrastructure, Fortify, Infrastructure Security, Intrusion, Network Security, public cloud, Resilience, SCADA, Security, Small Business Secure, Software (SAAS), Test, Threat Management | Leave a comment

An examination of DHCP Snooping with option 82 on Cisco.

DHCP snooping is a DHCP feature that provides security by filtering untrusted DHCP messages from hosts or other devices on the network. DHCP snooping accomplishes this level of security by building and maintaining a DHCP snooping binding table. An untrusted … Continue reading

Posted in Access Control, Cisco, Data, Home Security, Infrastructure Security, Intrusion, LAN, LAN Switching, Network Security, Physical Security, Security, Small Business Secure, Tech Tips, Threat Management | Leave a comment

Hackers hit ‘at least five oil and gas firms

A report compiled by security firm McAfee, has revealed that hackers have run rampant through the networks of at least five oil and gas firms for years. The hackers exploited weaknesses by means of a combination of con tricks, computer … Continue reading

Posted in Access Control, Critical Infrastructure, Infrastructure Security, Intrusion, Network Security, SCADA, Security, Threat Management, Web Security | Leave a comment

SCADA Security Heats Up

The use of Supervisory Control and Data Acquisition (SCADA) devices is growing. That growth is expected to continue to soar. SCADA revenues will grow from £3.2 billion last year to nearly £5 billion in 2016. Question is: What about security? … Continue reading

Posted in Access Control, Critical Infrastructure, Industrial Process Control, Infrastructure Security, Network Security, Physical Security, SCADA, Security, Test | Leave a comment

Should I use and IDS/IPS? If so, what type?

Intrusion detection systems and intrusion prevention systems can be quite expensive. As such, a risk-based decision should be used to determine which system is best and where should it be located to provide the most cost-effective benefits. There are typically … Continue reading

Posted in Access Control, Critical Infrastructure, Infrastructure Security, Intrusion, Network Security, Security, Test, Web Security | Leave a comment

Security – more than just a stateful firewall!

Security is hot. It has always been. It will always be. If you look at IT-related spending security budget allocations usually tend to be among the highest. However, having spent nearly 15 years directly and indirectly in various security-related roles, … Continue reading

Posted in Infrastructure Security, Network Security, Security | Leave a comment