Tag Archives: arshnet

Risks of File-Sharing Technology

What is file sharing? File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , | Leave a comment

Understanding Voice over Internet Protocol (VoIP)

What is voice over Internet protocol (VoIP)? Voice over Internet protocol (VoIP), also known as IP telephony, allows you to use your Internet connection to make telephone calls. Instead of relying on an analog line like traditional telephones, VoIP uses … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security, Software Security Risks | Tagged , , , , , , | Leave a comment

Browsing Safely: Understanding Active Content and Cookies

What is active content? To increase functionality or add design embellishments, web sites often rely on scripts that execute programs within the web browser. This active content can be used to create “splash pages” or options like drop-down menus. Unfortunately, … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Network Security, Software Security Risks | Tagged , , , , , , , | Leave a comment

Evaluating Your Web Browser’s Security Settings

Why are security settings for web browsers important? Your web browser is your primary connection to the rest of the internet, and multiple applications may rely on your browser, or elements within your browser, to function. This makes the security … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Uncategorized | Tagged , , , , , , , | Leave a comment

Understanding Web Site Certificates

What are web site certificates? If an organization wants to have a secure web site that uses encryption, it needs to obtain a site, or host, certificate. There are two elements that indicate that a site uses encryption (seeProtecting Your … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Hacked, Information Security, isecurity, Software Security Risks, Uncategorized | Tagged , , , , , , | Leave a comment

Cyber Security Challenge Launched

In an attempt to find the next generation of cyber security professionals, and because there are not enough cyber security professionals to go around!, the UK Government has launched the Cyber Security Challenge. With online and face-to-face competitions, the challenge … Continue reading

Posted in Computer Security, Cyber Security, Information Security, Technology | Tagged , , , , | 3 Comments

Web Head, CNF win $2.3 million Air Force contract

Monday, March 23, 2009, 4:09pm CDT Web Head, CNF win $2.3 million Air Force contract San Antonio Business Journal Two San Antonio technology firms have been awarded a contract to provide mission-critical cyber-security support to the U.S. Air Force Network … Continue reading

Posted in Cyber Security | Tagged , , | Leave a comment