Endpoint security is definitely an approach that I favour. Keeping a network secure is an immense challenge that requires constant work and vigilance. Why introduce a client or server to your network before making sure that the device is as security hardened as possible?
Kim Crawley |
29 Jan |
Read more
When you read about security attacks involving mobile network technology, typically they're incidents that target mobile devices used by consumers.
Kim Crawley |
04 Dec |
Read more
Over the past twenty years or more, corporations in nearly all industries have been outsourcing and offshoring at hyperdrive.
Kim Crawley |
04 Mar |
Read more
World-renowned IT security expert Bruce Schneier is a friend of mine. He's worked extensively with my fiance, Sean Rooney, on a couple of projects. So, beyond my career-related need to keep up with the latest IT security news, I also read Schneier's website periodically the way people look at their friends' pages on Facebook. "What's he up to lately? What's on his mind?"
Kim Crawley |
03 Feb |
Read more
As early as 2007, if not earlier, Windows users encountered the very first rogue antivirus programs. Even today, end users are easily fooled by this vicious type of malware.
Kim Crawley |
03 Dec |
Read more