Security Program: How To Thrive?

From struggling and surviving, to a fully supervised security program.. Every day we see companies are struggling with running an smooth security program. No matter how much you are spending on it, the difference is not that much from zero budget to million dollars security budgets, regardless of how much we are spending on security […]

Complexity: The Hidden Monster behind Insecurity

No doubt that companies struggle with information security these days. Today they spend hundreds of thousand dollars, some millions, tomorrow they realize they have done nothing! Security folks do not have a night of peaceful sleep because they know what they have done during the day could easy be compromised! Regardless of why we are […]

Tips To Buy And Implement A SIEM Solution

Use following checklist to make sure you are on the right track to choose the SIEM solution. The whole process takes 1-4 weeks based on your dedication and vendor availability. Remember the worst thing is being in rush in five four steps: Write a plan Write down all the steps you anticipate and maintain documentation […]

Three Reasons To Trust SECURE TARGET

Articles will be revealing in many aspect of information security and information technology in general, but why would you trust SECURE TARGET? Being blunt by default and straightforward about root causes of tech insecurities is not common at all. You will soon experience (if have not already) how the Computer Security business is not different […]

Commitment: The Sole Reason Behind Hackers’ Community Supremacy

Are hackers ahead of IT security? Why the balance between two parties of hackers and security folks (it is hard to consider them a Community!) has been lost for a long time? What made a big gap when there was not such a huge difference in 90’s? Many factors are involved: knowledge, intelligence, team work […]

Five signs IT is overwhelmed with operations

There are signs before your IT department faces a disaster or worse, jeopardize your business by affecting tech operations in different departments. Those are signs of an overwhelmed IT so let’s take a look at common signs and symptoms: 1) Lack of resources Whenever your IT staff are always talking about lack of resources be […]

Five Reasons to Start Your SIEM Initiative Today

Regardless of how SIEM in today’s cybersecurity marketing campaign is driven mainly by Compliance, which solutions is the best, and whether it should be managed or on-premises, Security Information and Event Management is conceptually accepted among security professionals so here’s my top reasons to consider SIEM implementation as one of your cybersecurity initiatives: Another tool […]

Cyber-War: An Analysis

Let’s learn about War and away from it in order to provide peace to people… Download and read Cyber War, (PDF) An Analysis, an ebook in Farsi text. In a Cyberwar, the importance of public services is equal to military bases! Publication: SECURE TARGET Cyber-Peace in English…Soon. Kaveh Mofidia Cyberspace entrepreneur with more than 30 years of […]

Microsoft Windows Huge Text Processing Instability

SECURE TARGET (Security Advisory October 17, 2004) Topic: Microsoft Windows Huge Text Processing Instability Discovery Date: October 14, 2004Original Advisory External Links: Full-Disclosure, BugTraq, SICHERHEITSLüCKEN, Addict3d, Ls, Der Keiler, Seifried, NetSys, Mail Archive, SecLists, Neohapsis, Checksum, Network Security, Virus, DoddsNet, ReadList, Mega Security, Security Trap, Virovvch, DevArchives Affected applications and platforms: Notepad, NotePad2 and MetaPad […]

PerfectNav Crashes IE

Secure Target Network (Security Advisory February 25, 2004) Topic: PerfectNav Crashes IE Discovery Date: February 24, 2004 Original Advisory External: Full-Disclosure, BugTraq, Security Tracker, xforce, SANS Affected applications and platforms: Microsoft Internet Explorer 6 Service Pack 1 and older versions Introduction: PerfectNav is designed to redirect your URL typing errors to PerfectNav’s web page. Bundled […]