Feeling insecure? Click here: http://go.solarwinds.com/securityweek/ Tune in each day at 1pm Central from August 19 — 23 for a brand new IT group therapy se…
5 Best Practices: Network Configuration Management
For more info on NCM, visit: http://www.solarwinds.com/network-configuration-manager.aspx. This video will cover industry best practice recommendations for N…
MadCat: A Virtual Drama
For more information: http://bit.ly/MadCat A group of ad men try to determine the best idea for a Virtualization Manager video.
Sophos UTM Connected (9.1) – Maintenance release information
This highly anticipated release has had the fastest uptake of any release in our UTM history.
Astaro Security Gateway V8 is End-of-Life December 31st, 2014
This is your official reminder that Version 8 of Astaro Security Gateway will be end-of-life on December 31st 2014. If you are not running any Astaro Security Gateway Version 8 installations, you unaffected by this announcement and can disregard it. If you still maintain an active ASG V8, it is important that you read on for what this end-of-life means for you
June’s Patch Tuesday – On the Way!
It’s time for another episode of Microsoft Patch Tuesday! Tell ‘em what they’ve won, Bob! A new caaaarrrrr! Wait. That’s not right. Sorry.
Virtual Storage Console for Red Hat Enterprise Virtualization
“VSC for RHEV” is currently under heavy development.. we hope to have a public beta by end of Summer 2013..
Phishing – Alive and Well
Last week I was getting caught up on the usual deluge of emails, and one caught my eye. I’ll admit, at first glance, I almost clicked without thinking.
Microsoft Hits Citadel Hard
Late last week, Microsoft’s Digital Crimes Unit, working with the FBI and the U.S. courts, took a huge chunk out of the capabilities of the Citadel botnet. Citadel is a ZeuS variant that is responsible for infecting what is believed to be millions of computers across the globe in the hopes of stealing financial information through key logging and form grabbing and using that information to steal money from the bank accounts of infected victims.
Google and the Zero-Day Conundrum
Last week Google announced a significant change to the way they disclose vulnerabilities. In cases where a zero-day vulnerability has made it into the wild and is being actively exploited, Google will now give a scant 7 days to the software vendor whose product is being exploited before ”…support(ing) researchers (by) making details available so that users can take steps to protect themselves.” We hope that the details Google will make available do not include full disclosu…