Industry


April 15, 2015

By Bob Tarzey

Many will be familiar with the term bot, short for web-robot. Bots are essential for effective operation of the web: web-crawlers are a type of bot, automatically trawling sites looking for updates and making sure search engines know about new content. 

To this end, website owners need to allow access to bots, but they can (and should) lay down rules. The standard here is to have a file associated with any web server called robots.txt that the owners of good bots should read and adhere too.


July 17, 2014

By Bob Tarzey

There has been plenty of talk about the threat of cyber-attacks on critical national infrastructure (CNI). So what’s the risk, what’s involved in protecting CNI and why, to date, do attacks seem to have been limited?


July 16, 2014

By Richard Stiennon

Hand held bar code scanners and RFID chips have changed logistics dramatically in recent years. From manufacturing to every stage of transportation, inventory, and delivery items are scanned tracked in ERP systems.


July 14, 2014

By Linda Musthaler

Attackers know that if they want to compromise an organization an email with a malicious link or attachment is often the path of least resistance. 

Armed with a wealth of information freely shared online, attackers use social engineering as a means to entice employees into opening the message, and if the malware is successful, the endpoint is compromised and likely leads to further damage.

June 16, 2014

By Richard Stiennon

Back in 2005 we launched a directory of IT security vendors as part of IT-Harvest. Three people in Salt Lake City worked 4 months to compile and categorize 1,200 vendors, their products, and their executives.


June 13, 2014

By Richard Stiennon

In the early days of the Internet the most powerful driver was the opportunity to reduce telecom costs. Large enterprises had tremendous costs in leased lines from telcos. A service provider that could move traffic over the Internet could justify the move by demonstrating cost savings.


May 30, 2014

By Richard Stiennon

The sudden and inexplicable demise of the popular TrueCrypt product is raising eyebrows this week. TrueCrypt was a free encryption product supported by anonymous developers. There was quite a bit of suspicion already about the provenience of TrueCrypt, which sparked an effort to independently validate that it did not contain backdoors or vulnerabilities.


April 28, 2014

By Richard Stiennon

The rise of highly targeted attacks is disrupting the security industry with many new solutions coming to market that seek to detect, disrupt, and deny an adversary’s attempt to get in and steal information.  The biggest growth areas are security intelligence and various methods of sand boxing.


April 24, 2014

By Richard Stiennon

While it is fairly common for the Chairman of the Board of a publicly traded company to step in to the CEO role, it is rare to see that happen at a venture backed company. Ray Rothrock of Venrock Capital has taken on the role CEO of RedSeal Networks.


April 24, 2014

By Richard Stiennon

Cisco’s announcement earlier this week that they were launching a Threat Defense Managed Service was surprising in that it was the first of the large existing MSSPs in the business to do so. But not surprising in light of the fact that device monitoring and logging of alerts does very little to counter so-called advanced threats.


Page 2 of 4 : First   1 2 3 4 Last

The Human Factor: Gain new insight into the ways attackers exploit end-users' psychology​​

About Security Current | Privacy Policy | Subscribe to our newsletter