Posts Tagged 'Foundstone'
Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]
This is part III in a series on proactive defense using a proven professional services security methodology As I was watching the Cowboys and the Packers fight it out in the NFL playoffs a few weeks ago, I found myself thinking about the mindset of the coaching staff as certain plays were called and executed. […]
This is part II in a series on proactive defense using a proven professional services security methodology To me, the human body is a miracle and a mystery. But, I often think the same thing about the growing complexity of enterprise networks and the security solutions that are intertwined throughout them like our delicate circulatory […]
This is part I in a series on proactive defense using a proven professional services security methodology When my credit card got declined at the gas station I remembered a term I’d recently read in an article about a large retailer’s data breach. The term is “vulnerability-fatigue,” where news of a recent disaster is ignored […]
In 2014, companies continued to be shaken out of their contented relationship with corporate security efforts. Retailers were hacked. Millions of emails were lifted. Thousands of Social Security numbers were stolen. Gone is the era of “set it and forget it” security, where enterprises use only default security settings. This epiphany, motivated by news headlines, […]