Information Security Leader, Author, Instructor and Speaker

Default utility Image

Esafe 4.0 TAGS: | | | Content filtering typically means a mix of antivirus and antispam software, and a variety of e-mail, IM, Web and URL …Continue reading →

Default utility Image

How to detect and prevent keylogger attacks TAGS: It’s now standard practice to have antivirus software and desktop firewalls running on networked systems. However, these defense measures fall …Continue reading →

Default utility Image

Desktop Security: GreenBorder Enterprise Security TAGS: | | Enterprise Security Solution doesn’t detect anything; it protects Internet Explorer and Outlook users from themselves through a sandboxing technique that …Continue reading →

Default utility Image

Rife phishing, mutated worms and funds in ’05 TAGS: | Web security in 2004 was typical given the various vulnerabilities and exploits that attempted to undermine the security of network …Continue reading →

Default utility Image

Tools for combating spyware in the enterprise TAGS: | You’ve probably seen the buzz in both the trade and consumer press about the threat spyware applications pose to user …Continue reading →

Default utility Image

Understanding malware: A lesson in vocabulary TAGS: | Viruses, worms, Trojan horses – the terminology of malicious code sounds like some strange mix between a medical reference and …Continue reading →