Our networked systems, be they computers, databases, phones, or other devices, are an endless battlefield. Zero-day exploits have been buzzing in the news in the wake of the Wikileaks concerns, where a number of such exploits had been posted where any who were interested could learn illegally about how to use them. Many are worried about…

Read More

At the end of March the Inspector General released a report on the effects of BYOD (bring your own device) on the U.S. military. The findings were a little worrying as the Military lacked some of the basic guidelines that many business have in place.       The following points are from the reports findings: Mobile devices were…

Read More