Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

IT Security Policy: The First Line of Defense

An IT security policy is a statement by management to how the organization will protect their resources from unauthorized access, alteration, or destruction. The IT security policy also provides a blueprint of management’s strategy as regards information security.

Adobe Zero-Day Attack on DC-Based Organizations

On June 4, 2010, Adobe announced a critical vulnerability with Adobe Flash Player, Adobe Reader and Acrobat that could allow attackers to take control of the affected system. While Adobe is working to release a fix, the vulnerability is being actively exploited in what are known as Zero-Day attacks.  Since then, a series of Advanced […]

IT Security Policy: The First Line of Defense

An IT security policy is a statement by management to how the organization will protect their resources from unauthorized access, alteration, or destruction. The IT security policy also provides a blueprint of management’s strategy as regards information security.

Adobe Zero-Day Attack on DC-Based Organizations

On June 4, 2010, Adobe announced a critical vulnerability with Adobe Flash Player, Adobe Reader and Acrobat that could allow attackers to take control of the affected system. While Adobe is working to release a fix, the vulnerability is being actively exploited in what are known as Zero-Day attacks.  Since then, a series of Advanced […]