Hot Topics
Cisco Security Manager CSM Overview – 4.6 SP1 Update Available -

Cisco appears to be serious about security providing a major update to its security management suite. Hopefully. 

6 hours ago | 0
Is Mobile Security still a top concern for IT Managers? Should it Be? -

The world is much smaller than it was 7 years ago. In 2007 Steve Jobs announced the Apple iPhone. It was an innovative. 

17 hours ago | 0
Chinese hackers take command of Tesla Model S -

The first documented successful hack of a Tesla Model S has come from China, Chinese security giant Qihoo 360. 

2 weeks ago | 0

Cisco Security Manager CSM Overview – 4.6 SP1 Update Available

By Aamir Lakhani | On Mon, Jul 28th, 2014 - No Comments »
firewall connection

Cisco appears to be serious about security providing a major update to its security management suite. Hopefully we will start to see (if rumors are to be believed) the merging of the excellent management tools from Sourcefire along with Cisco’s management software. Cisco Security Manager is used to manage multiple Cisco security products. Management includes centralizing configuration,. 

Is Mobile Security still a top concern for IT Managers? Should it Be?

By Aamir Lakhani | On Mon, Jul 28th, 2014 - No Comments »
Young and happy urban people having fun with digital tablet

The world is much smaller than it was 7 years ago. In 2007 Steve Jobs announced the Apple iPhone. It was an innovative product because it brought mobile Internet in the pockets of millions of people. Smartphones were in existence before the iPhone. Blackberry devices were common issued devices for mobile email connectivity. The Treo handsets were popular with technology minded corporations. 

Advantages Of Streaming Videos And Steps To Create Video Streaming Website

By Blog | On Fri, Jul 25th, 2014 - No Comments »
global of stream video

  In the initial years, the regulations related to internet did not permit the display of images. Now there has been a change in this arena as it is more of a multimedia environment and videos are used in the websites to make their web presence prominent. Majority of the businesses add streaming videos to the sites for the host of advantages that are attached with the same. If you want. 

Chinese hackers take command of Tesla Model S

By Aamir Lakhani | On Fri, Jul 18th, 2014 - No Comments »
tesla-model-s-sunset

The first documented successful hack of a Tesla Model S has come from China, Chinese security giant Qihoo 360 Security Technology announced Thursday. The hackers were attempting to win $10,000 in prize money at a kick-off event during the SyScan +360 security conference, which is co-sponsored by Qihoo. They were able to gain remote control of the car‘s door locks, headlights, wipers,. 

9 astonishing Apple ads you probably missed

By Aamir Lakhani | On Sat, Jul 5th, 2014 - Comments Off
Apple Security

9 astonishing Apple ads you probably missed Luke Dormehl (6:00 am PDT, Jul 2nd) From sledgehammer-tossing freedom fighters to misunderstood teenagers at Christmas, Apple’s TV commercials have hit us with some truly iconic imagery over the years. But when a company has been around since the 1970s, it’s no great surprise that a select few ads would slip our collective memory. After. 

Sourcefire Defense Center Overview

By Joey Munz | On Wed, Jul 2nd, 2014 - Comments Off
sourcefire-logo

Joey Muniz, from The Security Blogger writes a great post on how Cisco acquired Sourcefire in 2013 as part of a strategic move to enhance Cisco’s security portfolio. Sourcefire’s catalog covers IPS/IDS, Application Security and Control, Firewalling, Malware Detection and a slew of open source tools such as SNORT, ClamAV, and Razorback. One key piece to the Sourcefire puzzle is the management. 

Online Casino Security

By Blog | On Tue, Jul 1st, 2014 - Comments Off
online casino

The importance of online security The emergence and subsequent advancements in technology continue to revolutionise the way we live in the 21st Century as our dependency on the latest gadgets and systems increases. Computers, mobile phones and tablets remain amongst the highest grossing technology available on the market, with optimum specifications and extensive range of functions providing. 

Active DDoS Attack – Top 12 tips

By Blog | On Mon, Jun 30th, 2014 - Comments Off
ddos

1. Don’t Panic! It is inevitable that you will be affected by a Distributed Denial of Service (DDoS) attack at some point. A DDoS attack is a shock to the system and how you react is everything. When it happens, stay calm and accept it. Someone who is comfortable at making good decisions needs to take control of the situation. There is no quick fix DIY on the spot solution. Any reaction.