A General Defence Against Injection Attacks on Websites

By Adrian J. Beasley The usual range of IT Security techniques is of little use against injection attacks. They can mitigate some of the effects of such attacks by, for example, setting proper permissions on resources, and ensuring that access from websites is under a user with the appropriate least level of privilege. But ultimately…

1

Windows Server 2008 Protection from Accidental Deletion

By Richard Siddaway, Microsoft Practice Leader, Centiq Ltd With each new version of the Windows Server Operating System there are new possibilities for automation to help make the administrator’s job easier.  Automation brings increased efficiencies but also brings the possibility of bigger mistakes.  Additionally no amount of automation can protect us against human error.  This…

2

Be proactive: Information Security as a Business Enabler

Thanks to Paul Vincent for contributing his article Information Security; The Business Enabler. Paul goes on to explain how information security is much more than setting every security control you can lay your hands on.

0

Information Security; The Business Enabler

By Paul Vincent Don’t get me wrong, I’m a tecchie. There was a time (and it wasn’t that long ago!) when I could name and identify the function of pretty much every Group Policy Object setting in Windows XP. However, Information Security is more than setting every security related configuration to it’s highest setting. In…

2

ID: Who do you think you are?

Thanks to Craig Murphy for contributing his article titled Who Do You Think You Are? – it’s well worth a read. He talks about identity from the perspective of a variety of vendors and applications.

0

Who do you think you are?

By Craig Murphy Actually, that’s the wrong question, I really need to know who you are, who you really are, please confirm your identity.  How are you going to tell me who you are?  I’ve got an e-mail address, send me an e-mail and I’ll reply, then you’ll know who I am because I’ve got…

1

How to make sense of anti-virus reviews

Thanks to David Harley for sharing some of his vast experience of the anti-virus industry in his article titled An Insider’s Guide to Comparative Anti-virus Reviews. David explains in detail how independant labs evaluate software and includes links and guidance for further research.    

0

Insider's Guide to Comparative Anti-Virus Reviews

By David Harley There has been a certain amount of excitement and irritation in anti-virusresearch circles about a not-very-good comparative test of antivirusscanners that was conducted at LinuxWorld on 8th August, 2007. I was soexercised personally that I sat down and wrote a long white paper (free,gratis and unpaid by anyone) on Untangling the Wheat…

1