Business IT Teams will almost certainly be aware of the importance of finding security vulnerabilities within the company’s
Five Top Wifi Security Tips
Wireless technology can make intrusion attempts easier because the attacker does not need physical access to the network
You Can’t Just Rely on Your Anti-Virus Solution
An antivirus solution is now a standard fixture in the IT security arsenal of any serious IT shop. It should allow the system to scan static files on disk and also programs that are resident in memory for suspected malicious activity. This is clearly good practice and is, indeed, a basic essential, but attackers that …
Does ISO 27001 Require Penetration Testing?
We are often asked whether vulnerability assessment or penetration testing are required for ISO 27001 compliance.
So You Need to Conduct a Firewall Review
Firewall audits receive a lot of attention nowadays due to standards such as PCI-DSS, ISO 27001 and SOX and HIPAA
Social Engineering Testing and PCI
The term social engineering refers to the practice of attempting to compromise a system through the manipulation of those who
PCI Segmentation Checks – What’s Required
PCI DSS requires that network segmentation controls are penetration tested and that the methods used are operational
Application Penetration Testing for PCI
When considering application penetration testing for PCI, any software written by your organisation or written specifically for it,
PCI Penetration Testing – How to Define The Scope
Cardholder Data Environment
The PCI DSS defines the cardholder data environment (CDE) as follows:
PCI Penetration Testing Vs Vulnerability Scanning
If you take credit card payments, you may be aware that regular vulnerability scanning and penetration testing are
New Check Point Software Offers 100% Malware-Free Emails
Malware hidden within emails can be a severe security risk to many businesses with figures suggesting that
Over-reliance on Anti-Virus Software May Cost You
Nowadays, antivirus software is a standard part of any IT security arsenal, allowing the user to scan both static
Ghost leaves Linux systems vulnerable to possession
A vulnerability recently found by Qualys, in most Linux distributions could allow attackers to take remote
Prime Minister hints at ban on end-to-end encryption
Following he attacks in Paris on Charlie Hebdo, David Cameron
12 million homes and business routers vulnerable to remote attack
It may be Christmas time for most of us, and we may get a chance