fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Cybersecurity

PLM: Automate your Product Development Compliance Process

PLM: Automate your Product Development Compliance Process

Developing new and innovative products is essential for companies to survive and thrive -- however safety can never take a backseat to innovation. That is why many companies, like those in the Medical Devices, Aeronautics and Automotive industries, have strict...

Top 3 Engineering Outsourcing Trends of 2013 from Industry Experts

Top 3 Engineering Outsourcing Trends of 2013 from Industry Experts

Predictions are hard to make in any area of life, however short term forecasting is not impossible. Ask a meteorologist for the weather in the next twenty-four hours and you will get a fairly accurate prediction. Ask for the outlook over the next 30 days and you will...

How to Install Snort on a Redhat 6 Box

How to Install Snort on a Redhat 6 Box

Snort is used for performing security checks on network boundaries. This can be done on the outside Untrust network but is sometimes more useful to look at what’s getting through your firewall into the web servers. Follow our step-by-step instructions on how...

Using SSH to Securely Tunnel a TCP Application

Using SSH to Securely Tunnel a TCP Application

Often times, I'm caught in a situation where an application or service is not directly accessible to me from the network I'm currently on.  For instance, if I'm at a customer site, I may need VNC or RDP access to a collocated server.  Sure, I could open up port 5901...

LinkedIn Password Database Leaked!

LinkedIn Password Database Leaked!

LinkedIn, the social network for professionals, has reported that its user database has been hacked and the encrypted passwords of 6+ million users have been stolen. Even though the password database was encrypted, users with weak passwords could be exposed with...

CAPA:  A Review of 21 C.F.R. §820.100 and FDA Warning Letter Trends

CAPA: A Review of 21 C.F.R. §820.100 and FDA Warning Letter Trends

SPK and Associates routinely review warning letters to help our clients stay in step with FDA trends.   One of the problem areas most often cited in company audits continue to be the CAPA system/program.   This month we will take a look at some of the latest FDA...

Security layers on a modern website

Security layers on a modern website

Last time, we looked at a basic website design.   Now it’s time to start digging into the details around what’s really being used behind the scenes.   This time, we’ll focus on security aspects.  When a user starts their browser and connects...

Enterprise Storage – Do you really get what you pay for?

Enterprise Storage – Do you really get what you pay for?

In my last blog post, I touched on my experience with Network Appliance filers and remote server monitoring.  This week, I will be discussing alternative storage solutions, and how they measure up to one of the biggest players in the Network Attached Storage...

How to Build a Corporate Web Infrastructure

How to Build a Corporate Web Infrastructure

As an IT professional, one question I’ve heard more than once is:   “Why do I need you – I can setup a computer, a web server, a database, etc”.    My answer varies based on the audience but essentially comes down to:  if you are entrusted with a company’s...