[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Security

25K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

Secure Software Development Life Cycle (S-SDLC) means security across all the phases of SDLC. A high profile security breaches underline the need for better security practices.
6

Expert Comment

by:Ibrahim Kasabri
Comment Utility
your security potentials limitless
good job
1

Expert Comment

by:Ammar Haj Hamed
Comment Utility
Good one.
1
Webinar: Cyber Crime Becomes Big Business
Webinar: Cyber Crime Becomes Big Business

The rising threat of malware-as-a-service is not one to be overlooked. Malware-as-a-service is growing and easily purchased from a full-service cyber-criminal store in a “Virus Depot” fashion. Join us in our upcoming webinar as we discuss how to best defend against these attacks!

libSSH Authentication Bypass Vulnerability Analysis(CVE-2018-10933)
0
Win10 Windows Information Protection - Part 2
This is Part II of the WIP series. In Part 1 we checked basic requirements for WIP implementation and configured WIP for data encryption without device enrollment. In this part, we will look at application installation/execution control and device management in addition to data encryption.
1
Win10 Windows Information Protection - Part 1
With Windows 10, Microsoft has come up with built-in support for Intune data protection policies. This is a two-part series. In this 1st part, we look at how and to what extent we can safeguard corporate data on Windows 10 workgroup machines (BYOD) with Windows Information Protection and Applocker
1
LVL 45

Author Comment

by:Mahesh
Comment Utility
Hi Andrew,

Many Thanks for putting your time, hard work & efforts in reviewing and publishing this article.

I will be more than happy if I get any option on this site to appreciate your honest efforts

Mahesh.
0
Name Mismatch Errors
Have you ever received a “This page is not protected” error while trying to access a web page? Maybe even your own web page? This may mean that the site, or your site, that you are trying to access has an SSL Certificate Name Mismatch error.
1
This article describes the Email relay concepts and the possible road blocks and solutions to certain email security scenarios.
1
Artificial Intelligence
We’d all like to think our company’s data is well protected, but when you ask IT professionals they admit the data probably is not as safe as it could be.
1
LVL 23

Expert Comment

by:Andrew Leniart
Comment Utility
Great article that explains the importance of not just relying on definitions based security solutions. Thanks for writing this. Interesting read!

Endorsed.
1
PDF Unlocker for Mac
Want to remove a security password from PDF files? Know simple tips and tricks to remove security and restrictions from PDF files on a Mac OS X. Follow each step carefully to unprotect an Adobe PDF document.
0
Data loss can hit a business in any number of ways, from employees accidentally deleting information and hardware failure to natural disasters and cyberattacks wiping out your systems.
1
Enroll in these four OWASP courses: Avoiding Hacker Tricks, Forgery and Phishing, Proactive Controls, and Threats Fundamentals. Also learn a basic introduction to web design where you can implement these OWASP security measures.
2
Cloud as a Security Delivery Platform for MSSPs
Cloud as a Security Delivery Platform for MSSPs

Every Managed Security Service Provider (MSSP) needs a platform to deliver effective and efficient security-as-a-service to their customers. Scale, elasticity and profitability are a few of the many features that a Cloud platform offers. View our on-demand webinar to learn more!

Blockwell.ai KYC Casper Token "Psoriasis Advertising" Event Analysis
0
In April 2018, the "SamSam" ransomware attack crippled the city of Atlanta. The recovery that followed provides a stark reminder of the real costs associated with ransomware – both technologically and financially.
0
This article documents the process of assigning different password policies based on user account password strength. The result of this script is that all the users that are using weak passwords are forced to have a password policy on them that allows their passwords to be valid for fewer days.
3
LVL 10

Expert Comment

by:Senior IT System Engineer
Comment Utility
Hi Shaun,

Can the DSInternals module be installed in another computer without RSAT installed?
Because I wanted to run the scheduled task for this report to send out email alert, not from the Domain Controller.
0
LVL 48

Author Comment

by:Shaun Vermaak
Comment Utility
Yes, it can :)

Just remember that you do not need DA. Configure an account with replicate directory access an use that in your scheduled task
0
ITSec vs CSec
I am sure that most of you will have chanced upon either of the terms like "Information (IT) Security" and "Cybersecurity" but do you know the differences and the implications as those threats evolve? Find out more in this article on the different security approaches that should be adopted.
2
Data integrity is the paramount concern when determining any form of a disaster recovery related solution. If a solution cannot preserve and guarantee the integrity of data placed in its trust, then the solution is of no value to an organization.
5
Newly released Acronis True Image 2019 includes their battle-tested anti-ransomware defense
1
LVL 17

Expert Comment

by:William Fulks
Comment Utility
Bagaudin - thanks for replying! This was with the 2015 version I purchased for work a while back. With previous versions we used to maintain a bank of system images and all that - for tech support - and with this new one because of the licensing it was limiting us to one machine. I also upgraded from a HD to an SSD and the process of making the image and restoring kept throwing errors even though both drives were fine. I eventually just quit using it and haven't in a couple of years.
0
LVL 2

Expert Comment

by:Bagaudin Satuev
Comment Utility
Thanks for the detailed feedback, William!

I dearly hope that if (when) you consider our products again - you'll let me or any other Acronis vendor expert know.
0
The Scavenging Attacks of Ethereum's stolen currency in"Post-Smuggling Era".
0
'Ethereum Smart Contract Specification Issue' Impact Analysis
0
This utility will help to identify the hash value of the application, which will help to protect computers from the various attacks.
0
LVL 36

Expert Comment

by:Terry Woods
Comment Utility
It's worth noting, for those who aren't aware, that MD5 is a broken algorithm for security use. If there is a stronger alternative algorithm available to be used, it would be a good idea to use it.

Further reading:
https://www.zdnet.com/article/ssl-broken-hackers-create-rogue-ca-certificate-using-md5-collisions/
https://blog.avira.com/md5-the-broken-algorithm/
0
Exploring ASP.NET Core: Fundamentals
LVL 12
Exploring ASP.NET Core: Fundamentals

Learn to build web apps and services, IoT apps, and mobile backends by covering the fundamentals of ASP.NET Core and  exploring the core foundations for app libraries.

Wifi Flaw
Nothing is ever secure - things get "broken" but not always easily mended. This is the norm today. Despite security measure put in place, cyber attacks are still successful because security controls themselves can be vulnerable as well. Catch this Wi-Fi security weakness run through.
5
The NEO Coolcam's webcam bypasses the login and multiple remote code execution vulnerabilities bases on stack overflow and data analysis report.
0
Best Cloud Security Company
Today most organizations have shifted their work to the cloud. In every corner of the world, users are making use of cloud services which can increase cyber attacks. None of us are secure from cyber attacks and data breaches. These issues provided an opportunity for Cloud Security Companies.
0
SysTools Endpoint Security
The review page draws the attention of readers towards the best endpoint security vendor i.e., SysTools Enterprise endpoint protection software. It is available easily in the digital market and offers top-level services at an affordable price.
0
Secure HTTPS
HTTPS is an essential technology and the Chrome browser developed by Google now shows “Secure” in the address bar when you visit a page with the HTTPS protocol such as https://www.experts-exchange.com but what does this mean? Is the website secure from malware? Is our identity secure?
0
The biggest challenges when it comes to mobile security: protection, integration and visibility.
4

Expert Comment

by:Jake Lees
Comment Utility
Nice post. Love to read it.
0

Security

25K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.