By Matthew Gardiner, cybersecurity strategist at Mimecast

 

What happens when you combine sophisticated anti-phishing attachment inspection, static file analysis, machine executable code in data files, customer reports of false positives, Microsoft Office suite, ActiveX controls and a bit of serendipity? The discovery of an important newly-patched vulnerability with Microsoft Office products!

Published in Opinion Pieces
Sunday, 28 October 2018 07:27

Three Hacks to Thwart a Hacker

By Alissa Johnson, PhD, Chief Information Security Officer, Xerox

 

Challenge questions are those questions that you set up with your own personal answers to help web sites know that it’s you – not a hacker. This only works if you are the only one who knows the answers.

Published in Opinion Pieces

By: Lars Herrmann, general manager, Workload Strategy for Cloud Platforms, Red Hat

 

In many ways, age brings refinement. Wine, cheese, and, in some cases, people, all improve as they grow older. But in the world of enterprise IT, age has a different connotation. Aged systems and software, can bring irrelevance and technical debt and, at worst, increased security risks. With the rise of Linux containers as a functional underpinning to the digitally-transforming enterprise, the ill effects of technological age are front and center.

Published in Opinion Pieces

By April Bourne, LSS Black Belt, Xerox Manager Sales Enablement and Training, Research & Product Development

 

There’s a big difference between gaining successful entrance to the king’s castle (Authentication) and what you are allowed to do once you are inside (Authorization). Chances are, as a visitor, your actions and movement will be restricted and for good reason. Just because you got through that big iron door does not mean you are allowed to do whatever you please.

Published in Opinion Pieces

By Mohammad Meraj Hoda, VP – Business Development at Ring

 

We all know that the holidays are a busy time of year. While we focus our efforts on shopping for the best online deals and planning the perfect holiday vacation, it’s easy to overlook what goes on at our homes. But when we go away for vacations, we leave our homes vulnerable to break-ins and burglaries. So, this holiday season, use the security tips below to make sure your home is secure while you’re away.

Published in Opinion Pieces