patch management

A Dialogue with Tadd Wood

In this ITSPmagazine An InfoSec Life column, Tadd Wood shares his views on how data—and people—play a role in identifying risk and addressing cybersecurity issues.

Ready To Connect, But Is Your IP PBX Secure?

VoIP and IP PBXs bring multiple benefits to businesses: from slashing telco costs, to increasing productivity, to boosting overall efficiency within the workplace. However, where there are pros there are almost always cons. It’s apparent that vendors and users need to become more attentive with regard to the potential risks involved when using IP for communications and actively undertake precautions to prevent being hacked.

The Far-Reaching Effects of a Malware Attack

When a company suffers a malware attack, the effects are widespread. Just how far, you ask? To help answer this question, expert Brian Laing explores this topic both far and wide.

SECURE DESIGN PRINCIPLES: How to Build Stuff Against Attacks

There is an overarching theme driving these security breaches: ineffective adherence to secure design principles. Expert Ted Harrington explores the world of secure design principles (and anti-principles) as a means to build resilient systems.

The Security Risks of Lost and Stolen Devices

Despite an increasing number of organizations are choosing to embrace the bring your own device (BYOD) trend, there are still considerable security risks involved that many are not aware of. This article will explain what are the possible security risks involved with BYOD and how to prevent them.

When the Society of Things Attacks Itself - A BBC World News Newsday Interview

We’ve heard about cyberattacks against critical infrastructure sites and systems including dams (Bowman Avenue Dam in NY), railroads, electrical grids (Israel, US, Ukraine), and even nuclear power plants (Germany). But it doesn't stop there. And it may not even begin there.