Tag: iPhone

Insomni’hack 2013

Insomni’hack 2013 took place last week at Geneva and I had the opportunity to attend. Insomni’hack DAY 1 consisted of one day workshops on subjects ranging from “Linux exploitation” to “How to make sure your Pentest Report is never empty”. I had the chance to attend a workshop on “Practical ARM exploitation” given by black Steve (@s7ephen) and white Steve (Stephen Lawler)

Cloud Security Alliance (CSA) says Data Breach, Loss Top Cloud Threat List

A new survey of industry experts from the Cloud Security Alliance (CSA) finds data breach and data loss at the top of nine critical threats to cloud security. Cloud computing is more mainstream among businesses and government now than ever before. CSA’s “The Notorious Nine: Cloud Computing Top Threats in 2013” report details the development of the cloud service model and how it delivers business-supporting technology more efficiently.

RSA Conference 2013: New Threats, New Solutions

The keynote speakers have gone home, the parties have ended, and another RSA Conference 2013 is over. By all reports, this year set records for attendance and business conducted. With a complex and evolving threat landscape and the accelerating adoption of disruptive technologies, exhibitors had a field day on the show floor with sophisticated releases that vied to differentiate in the burgeoning security markets

Twitter Hacks: How Avoid Being the Next Victim

Perhaps it had been too long since Twitter was the center of the public attention. Drama junkies were treated to a triple-whammy of cyber news this week when miscreants hacked into the Twitter accounts of Jeep, Burger King and none other than the global hacker collective Anonymous. In an ironic twist of plot, the infamous hacker group’s Twitter account was apparently overtaken by rival hacktivists, according to the BBC.

IT Complexity Bolsters Argument for Managed Security

The forward drive and accompanying expense found in the integration of existing systems and infrastructure with new technologies is placing pressure on organizations to rethink network security strategies. Increasing complexity of both IT and physical security requirements, observes Frost & Sullivan in its “Analysis of the Global Managed Security Services Market” (Feb

Mobile IT Management with Mobile Admin™ from SolarWinds®

Learn more here! www.solarwinds.com Join SolarWinds Sales Engineer Nomar Bodon on a guided tour of SolarWinds Mobile Admin. He’ll show you how you can manage your IT tasks from anywhere while using your iPhone®, iPad®, Android™ phone or tablet, or BlackBerry® device, and how Mobile Admin can help you find a better work-life balance. Learn how to solve IT problems through Mobile Admin Software’s integration with Microsoft® Exchange® and SolarWinds Orion.