Half Sized Blog Element (Single Author Style)
Half Sized Blog Element (Multi Author Style)
IT Security Policy: The First Line of Defense
An IT security policy is a statement by management to how the organization will protect their resources from unauthorized access, alteration, or destruction. The IT security policy also provides a blueprint of management’s strategy as regards information security.
Adobe Zero-Day Attack on DC-Based Organizations
On June 4, 2010, Adobe announced a critical vulnerability with Adobe Flash Player, Adobe Reader and Acrobat that could allow attackers to take control of the affected system. While Adobe is working to release a fix, the vulnerability is being actively exploited in what are known as Zero-Day attacks. Since then, a series of Advanced […]
IT Security Policy: The First Line of Defense
An IT security policy is a statement by management to how the organization will protect their resources from unauthorized access, alteration, or destruction. The IT security policy also provides a blueprint of management’s strategy as regards information security.
Adobe Zero-Day Attack on DC-Based Organizations
On June 4, 2010, Adobe announced a critical vulnerability with Adobe Flash Player, Adobe Reader and Acrobat that could allow attackers to take control of the affected system. While Adobe is working to release a fix, the vulnerability is being actively exploited in what are known as Zero-Day attacks. Since then, a series of Advanced […]




