WiFi – PCI compliance: Why is it Important?
New devices and old alike: The issue with WiFi is that it is a network piece that can bite you if you are not aware of it. In PCI compliance…
What Do Compromised Websites Look Like?
Sucuri Blog has an interesting blogpost on how a website got compromised and allowed unencrypted Credit Card numbers(only in one specific area and for a few seconds) to be stolen…
What Makes a NextGenerationFireWall(NGFW) & Why Use It?
We know a firewall protects the network By using Port or protocol filter lists (also known as Access Control Lists) a firewall does protect the network in a minimal manner.…
Cyber Disasters Still Coming? Yes, We Do Not Learn Fast Enough
As Washington Post wrote a story about the old Lopht group visit to the Capitol Hill. http://www.washingtonpost.com/sf/business/2015/06/22/net-of-insecurity-part-3/ Do you remember the following historical events? True in 1871 Chicago had 330,000…
Can the Cloud “Fix” Your Security Risks?
A nice article at Network World about how Milwaukee Tool used the “Cloud” to remake a significant part of the company (product development collaboration). (I like that picture) So we…
