Can we prevent establishing of reverse SSH tunnel between corporate network and a public domain system?
Security Architecture Definition
The definition of security architecture has never been consistent among experts. While it is a framework for some, it’s a process or a detailed technical design for others.
I Lost Trust in You!
Shaheen shares a personal experience on identity theft
Make a little adjustment for the new Copyright Law
The Canadian Copyright bill was passed yesterday, a bill that demands a little adjustment to our day to day life. Till now, no one cared who is using our internet connection or what are the files being downloaded or uploaded using it. No one cared of your unscrambled satellite videos from across the border. However that’s all changing even though you may not want it that way. I guess no one can withstand the pressure of the “big guys” for too long.
Smartphone Security For Enterprise
Smartphones are now rich in features that include network connectivity, enough storage space with efficient processors. These enter your network through authorized corporate users while others are brought in by employees who purchased it themselves.