The UltraTech Zone

Integrating Life, Technology and Business with Andrew S. Baker...
Welcome to The UltraTech Zone Sign in | Join | Help
in
Home My Blog Forums Photos Resume Reading List External News Knowledgebase Consulting Mailing Lists Other Links

Browse by Tags

All Tags » Business » Malware   (RSS)
  • Reading Between the Lines of Breach Notifications

    Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance of How & When Sadly, to many organizations are doing something entirely different when it comes to post-breach notifications. I like to take ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on January 18, 2013
  • It’s Time to Re-evaluate Host-based Security

    I’ve said it for a few years now, but host-based antivirus is really not working out anymore.  Not with its reliance on signatures to detect malware. Recently, several prominent antivirus vendors have experienced problems with faulty virus definitions:  Faulty McAfee update burns IT execs BitDefender update breaks 64-bit Windows ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on May 10, 2010
  • The InfoSec Perspective for April 2010

    It has been a busy month or so for information security.  Apple has patched a vulnerability that was showcased in a recent hacking contest, Microsoft has released a major set of fixes in its most recently Patch Tuesday, and and Oracle (which now owns Sun) has not yet committed to patching a Java vulnerability on Windows that has been ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on April 15, 2010
  • Lessons from 2009: Functionality still trumps Security

    Yes, you heard me correctly… We still think about personal and corporate security only as an afterthought. Despite all the regulatory and industry compliance that has been created and updated in the past 15 years, as we close out this decade, we are hardly any closer to proactively applying security guidelines in our personal or professional ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on December 31, 2009
  • Searching for Return on Security Investments

    There are several major challenges to the successful implementation of good information security in many organizations today.  It is not because business owners do not think that security is important.  No, the issues exist because they do not grasp the complexities that embody the Information Security profession, and thus make decisions ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on October 30, 2009
  • Yes, Security Is Still Important in 2009

    Quite frankly, it’s even more important than it has been in the past.   This morning, I was reading some articles on information security, including news about the Conficker worm.  You know, we haven’t had a really good worm in 3 or 4 years, so it seems that people have forgotten about how dangerous those things can be, and how ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on February 13, 2009
  • Don't Drop the Ball on Security

    On a number of fronts, April 2007 is turning out to be a very interesting month for me.  For this particular post, we'll just touch on Information Security again. A recent report from MessageLabs indicates very clearly that targeted security attacks are on the rise, and that email is still a common threat vector.  This morning, I ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on April 18, 2007
Powered by Community Server (Personal Edition), by Telligent Systems