Monthly Archives: April 2015

Focus on 4 Areas to Protect from DDos Attacks

The recent crossfire incident where GitHub found itself battling to stabilize service exemplifies the critical importance of defending your network against DDoS attacks. While most US based security experts unequivocally point the finger at CNNIN’s complicity, simply identifying the origin of threats... Read More

Malware Morghulis

Are we losing the fight against malware and the hackers who are making every day a zero day? Few authors are as skilled as GRRM when it comes to killing off important characters. Clearly, that oft-uttered phrase from the eastern continent, “…... Read More

Ruggedized Dual Boot Handheld Tablets For Field Use

Field computing presents many unique challenges not found in the typical office environment. Dropped devices, overheating, freezing, and simple wear and tear are all common hazards faced by field equipment. If applications from multiple operating systems are required in the field, the... Read More

PCI Issues Penetration Test Guidance

EXPERTS DEBATE WHETHER ADVICE GOES FAR ENOUGH Experts debate the value of new PCI guidance for how businesses should use penetration testing to identify network vulnerabilities that could be exploited for malicious activity. Does the new advice go far enough? Read More… Read More