NuSecure Insights

Nuspire Networks releases Retail Vulnerabilities Interactive Infographic

Nuspire Networks, a global leader in enterprise network security services, has released an Interactive Infographic which details network security vulnerabilities that retailers need to be aware of and the risks associated with them. Read more about 'Nuspire Networks releases Retail Vulnerabilities Interactive Infographic'...

Nuspire speaks to Fox2News Detroit about Target breach

The situation with Target Corporation has captured the attention of many Americans and shows just how vulnerable large chains like Target can be to data theft.  Nuspire specializes in protecting... Read more about 'Nuspire speaks to Fox2News Detroit about Target breach'...

Looking back at 2011

This is the time of year that most of us look back at the last twelve months and evaluate what was accomplished.  We also look back at things we worked on... Read more about 'Looking back at 2011'...

Cloud Security: What does it mean? - Part 2

One of the advantages of using SaaS for anti-spam, anti-virus, and anti-spyware blocking is the ability of these services to reduce the amount of traffic into the private network.  The... Read more about 'Cloud Security: What does it mean? - Part 2'...

Cloud Security: What does it mean? - Part 1

I have been asked many times in the last few years about my definition of security in the cloud.  I find this a question that should be answered with a question.  I... Read more about 'Cloud Security: What does it mean? - Part 1'...

Vulnerability Management

Vulnerability management has and is an important aspect of a company's security posture.  The managing of vulnerabilities was instituted by IT professionals that were involved by what they affectionately call patch... Read more about 'Vulnerability Management'...

Privacy on the Web (Part 2)

We  look at the privacy items in this manner to discuss something many of us have done and will probably do in the future.  We have filled out online forms... Read more about 'Privacy on the Web (Part 2)'...

Privacy on the Web (Part 1)

As a security professional, I have monitored privacy laws for the past decade or so. My interest in these laws started long before that when a friend gave me a... Read more about 'Privacy on the Web (Part 1)'...

Moore's Law

Many of us have heard of Moore's law or have used the term when discussing the increases in computing power over the last couple of decades. Read more about 'Moore's Law'...

Data Explosion

Many years ago, MANY years ago, I bought a PC with a 10 Megabyte hard drive.  All my friends were envious of me having that tremendous amount of storage. Read more about 'Data Explosion'...

Social networking within a company (Part 2)

The issues around social networking are basically the same as in the past.  The general user population wants, even demands that social networking be allowed within and from outside the corporate... Read more about 'Social networking within a company (Part 2)'...

Social networking within a company (Part 1)

I attended a security conference a short time back (http://nuspire.com/CAMPIT.aspx).  There were two panel discussions that involved the securing of network data sources while allowing social networking by employees. Read more about 'Social networking within a company (Part 1)'...

What effect have the Regulations or Business Requirements had on Information Security? (Part 2)

The Secret Service report states that exploitation of vulnerabilities has dropped significantly in the last couple of years.  The reasoning is, many of these exploits can be stopped with a comprehensive vulnerability... Read more about 'What effect have the Regulations or Business Requirements had on Information Security? (Part 2)'...

What effect have the Regulations or Industry Standards had on Information Security? (Part 1)

All of us in the Information Security field have watched different security regulations become law and we have debated what effect they would have on our industry.  Some of us even... Read more about 'What effect have the Regulations or Industry Standards had on Information Security? (Part 1)'...

Massachusetts New Privacy Law (201 CMR 17.00): Are You Ready?

March 1, 2010 has come and gone. If you are a person who owns or licenses personal information about a resident of the Commonwealth of Massachusetts, the law has changed... Read more about 'Massachusetts New Privacy Law (201 CMR 17.00): Are You Ready?'...

3rd Party Applications Open Holes Too!

For years, we’ve heard the ire of security professionals worldwide over the vulnerabilities of the Microsoft Operating Systems.  Many touted Linux or even Macintosh as the answer.  Unfortunately, there is... Read more about '3rd Party Applications Open Holes Too!'...

Spend an Hour Now…Earn Double That Later!

As I’ve been traveling the country lately, I’ve been learning more and more about how the PCI-DSS requirements are affecting businesses.  There does still seem to be quite a bit... Read more about 'Spend an Hour Now…Earn Double That Later!'...

Clarifications on WPA/TKIP Vulnerabilities

Recently, a research paper published from Japanese academics demonstrated a newer, faster, and more reliable way to crack wireless networks that use WPA/TKIP protocols.  In the best case, such a... Read more about 'Clarifications on WPA/TKIP Vulnerabilities'...

Security Steps for Compliance Purposes? Why Not Just for the Sake of Security?

All too often I hear businesses ask the question, “What do I need to do to be compliant with XYZ regulation?”. Read more about 'Security Steps for Compliance Purposes? Why Not Just for the Sake of Security?'...

Small Merchants and PCI Compliance

Are you ready? As you may or may not be aware, starting next summer ALL merchants including the smallest will be required to become PCI compliant. Read more about 'Small Merchants and PCI Compliance'...

1 2 3 4 5 6 7 8 9 10 11 12


Nuspire Insights






Nuspire Infographic


Contact Us