Feed: Articles & Tutorials

Contains: 18 categories / 769 items. Last Updated: 2014-12-17 10:48:18+00:00 Average Rating: 4

Latest articles

V2V Communications security considerations

The future of vehicles, road infrastructure and driving are changing. We are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications and growth of these technologies can be attributed to the many benefits that they may provide both drivers and the community as a whole.

V2V Communications security considerations

The future of vehicles, road infrastructure and driving are changing. We are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications and growth of these technologies can be attributed to the many benefits that they may provide both drivers and the community as a whole.

Where to (and not to) focus your security efforts

20 years ago we approached IT and security quite differently compared to how it is done (or should be done) today. Most organisations had their data centres onsite, housing servers where they kept everything locked away behind a firewall.

Product Review: UserLock

UserLock is a product that works alongside Active Directory to protect and enhance access to Windows systems (laptops Desktops and Servers).

Mirai may be coming to a Windows machine near you

The Mirai botnet has been the cause of many notorious DDoS attacks of late, denying access to popular services including Facebook, Amazon, Twitter and Netflix to name a few. The IoT based botnet is now going a step further and is utilising Windows hosts to facilitate attacks

GDPR: Data Protection Impact Assessment

Since the last data protection directive (EU) of 1995, the way in which data is processed has evolved drastically. Up until more recently individual’s rights have not been at the forefront of concern when their data is processed and there has been a divide between individual’s rights for protection and the implementation of new technologies. Moreover,...

Ransomware-let’s fight back!

Although ransomware has been established for a very long time: recently people have been made more conscious of ransomware and are more knowledgeable of what it is, including its regular occurrences. Albeit not new, the impact of ransomware has likely become more far reaching and more serious with time. Businesses are more reliant on digital data and...

Shielded VMs in Server 2016

In this article we'll look at Shielded VMs in the latest version of Windows Server 2016.

The Ultimate Guide to Addressing Web Security Vulnerabilities

This article looks at addressing web security vulnerabilities.

PAM in Server 2016

In this article we're going to look at how the PAM features of Server 2016 can be leveraged to help you make your environment more secure than ever.

Discover, share and read the best on the web

Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!