Archive for July, 2010

What We’re Reading, Week of 7/26

Posted: 30th July 2010 by VPN Haus in Highlights
Tags: , , ,

The Register, The Terror Beyond the Firewall ZDNet.com, Hacker Breaks Into ATMs, Dispenses Cash Remotely SC Magazine, Cybercrime Costs Businesses $3.8 Million Per Year CSO, A striking Disconnect Between CSOs and Hackers SC Magazine, Black Hat 2010: Why User Quality and Design Matter for VPNs [tweetmeme source=”vpnhaus” only_single=false] Share this:EmailFacebookPrint

At this week’s Black Hat 2010 in Las Vegas, NCP engineering is releasing a new white paper that sheds light on common VPN vulnerabilities that put organizations at risk. It’s prudent to occasionally survey the threat landscape with a fresh lens because while VPNs aren’t new, the threats they combat are constantly changing and require […]

What We’re Reading, Week of 7/19

Posted: 23rd July 2010 by VPN Haus in Highlights
Tags: , ,

*Editors’ Note: This week, Highlights will focus on Black Hat 2010, being held in Las Vegas next week. We encourage our readers to send us their thoughts and experiences from Black Hat 2010 at editor@vpnhaus.com. Ars Technica, Millions of Routers Vulnerable to New Version of Old Attack: Presentation at Black Hat 2010 CSO, Black Hat, […]

VPN Haus recently talked to Marshall Maglothin, a Washington, DC-based consultant specializing in healthcare virtual management. Maglothin gives us his perspective on keeping patient information safe without hindering speedy access to urgent data. VPN Haus: What are the basics for provisioning employees at healthcare organizations? Maglothin: All systems should have all users using unique passwords. […]

VPN Haus recently talked to Marshall Maglothin, a Washington, DC-based consultant specializing in healthcare virtual management. Maglothin gives us his perspective on keeping patient information safe without hindering speedy access to urgent data. VPN Haus: What are the basics for provisioning employees at healthcare organizations? Maglothin: All systems should have all users using unique passwords. […]