This is a guest post written and contributed by Elad Yoran, CEO of Vaultive, a Rackspace Cloud Tools partner. Vaultive provides cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services.
We know that the public internet can be a scary place for servers. Log files of servers attached to public addresses show regular port scans and URL snooping and are a constant reminder that your hosts are one misconfiguration away from catastrophe.
ionGrid Nexus offers secure mobile access to corporate file repositories and reliable interaction with documents to simultaneously address the needs of enterprise end users and IT. Simple to install over corporate networks, Nexus offers comprehensive mobile document protection that ensures IT security policies and access controls are preserved at the file level and eliminates the need for costly mobile document management solutions.
This week, our Anatomy Of An Attack infographic showcased steps hackers may take to crack into your systems. The goal was to show the discovery process that an attacker goes through when looking to do something nasty. We’re not looking to spark fear, but instead to instill some common sense goals to lock down systems before attackers have a chance to penetrate them.
How does access to web properties end up in the hands of a hacker? In this interactive piece, we’ll take you through the steps on how an attacker goes about targeting an organization. The primary goal of such an attack could be to gain access to competitive intelligence, to interfere with business by modifying or defacing a web site or to otherwise disrupt normal business activities – which can all affect you.
This is a guest post written and contributed by John Weinschenk, President & CEO at Cenzic, a Rackspace Cloud Tools Partner. Cenzic provides software and SaaS offerings to help protect websites from hacker attacks.
The advent of the Internet (actually the advent of software used by the general populace) has create an entire new bunch of folks with ulcers caused by the worries around password management. Passwords it seem are both the bane of our existence and, apparently, the most important thing in our lives.