Hackers Successfully Breach RSA Networks
Security vendor RSA has publicly announced that hackers have successfully compromised parts of their network and extracted information relating to their SecurID products.
Security vendor RSA has publicly announced that hackers have successfully compromised parts of their network and extracted information relating to their SecurID products.
The Epsilon data breach that compromised tens of millions of email addresses has been the big news of the email world lately. What are you telling your customers to expect?
This tutorial will show you how to configure the Exchange 2010 POP3 service to allow remote email users to connect securely without exposing their user credentials to attackers.
A lot of businesses want to be able to track who accesses mailboxes in the organization, and who takes certain actions such as deleting mailbox items. This is particularly true where mailboxes are accessed by delegates, for example when a senior manager has several people who access and manage their mailbox, or for shared mailboxes such as those used by sales and support teams.
SPAMfighter Exchange Module is an Exchange Server antispam product that combines multiple filter types with cloud-based scanning to protect servers from spam and virus outbreaks.
Some marketers hate the idea that they need permission to enter your inbox. They don't say it in so many words. They talk about "implied permission", and their responsibility as marketers to anticipate consumer wants and deliver relevant emails to them. And they think thats what consumers want from them.
This tutorial demonstrates how to create a secure Receive Connector on an Exchange Server 2010 Hub Transport server to allow other servers or devices to relay mail.
In some scenarios a mailbox user sending emails to a mail-enabled Public Folder may receive an undeliverable message with a reason of "MapiExceptionNotAuthorized".
SecurityDistro.com has published my tutorial on how to use GFI LANGuard to find and resolve security vulnerabilities on your network.
“The CA system is broken, but it works because broken systems tend to be better for society, which needs fluidity in the face of complicated social constructs,” Schneier said. “Systems that are broken but work are very common in the real world: Front door locks are surprisingly pickable. Think of faxed signatures, for example. It’s […]
To quote Bruce Schneier, “well-designed security systems fail gracefully”. This means for example when the ISA firewall service fails it closes off network connectivity entirely (ie retains security) instead of opening your entire network up (ie decreases security). This week SonicWALL’s license servers suffered a glitch rendering thousands of customer units useless and leaving the […]
Microsoft provides two useful resources for MOSS security: Security for Office SharePoint Server 2007 (downloadable book) Office SharePoint Server Security Account Requirements (worksheet) Link: John Westworth’s blog on Technet