clipped from news.zdnet.com
One of the questions I'm frequently asked is, "If perimeter-based data security strategies are breaking down, why aren't more companies using encryption to protect their confidential information?"
|
Thursday, January 31, 2008
Phil Dunkelberger on encryption
The law of contracting electronically
clipped from www.entrepreneur.com
|
Tuesday, January 29, 2008
New data security breaches come in fours
clipped from www.computerworld.com
|
Using sFlow for Network Forensics
clipped from www.breachbytes.com
|
Friday, January 25, 2008
Deliver a Presentation like Steve Jobs
- Set the theme.
- Demonstrate enthusiasm.
- Provide an outline.
- Make numbers meaningful.
- Try for an unforgettable moment.
- Create visual slides.
- Give 'em a show.
- Don't sweat the small stuff.
- Sell the benefit.
- Rehearse, rehearse, rehearse.
Wednesday, January 23, 2008
Keeping user data private
clipped from eddblogonline.blogspot.com I'm an IT administrator at a community college and am gearing up for the New Year. Many students have their social security numbers on file and also use their credit cards to pay for classes online. What approaches should I make to ensure others can't take this data and use it as their own? My answer won't be the cure-all solution, but I am providing you with some tips that will assist you in working towards your goal. Some of the basics you want to cover include, but are not limited to, the following: * Using Intrusion detection/monitoring for critical applications * Encrypting the sensitive data * Using secure firewall(s) and current configurations * Knowing where the sensitive data resides * Using a DMZ to protect the internal network from the external network * Using strong authentication on equipment * Using virus checking with current updates * Limiting access to the data (access management) |
Three tips for print security
clipped from eddblogonline.blogspot.com Despite the vital role that networked printing and imaging resources play in the processes and workflows of many organisations, the imaging and printing infrastructure is often an overlooked security vulnerability. In today's office, multifunction peripherals (MFPs) can print, copy, scan to network destinations, send email attachments and handle incoming and outgoing fax transmissions. As such, MFPs have evolved to become an efficient and cost effective method of document distribution and storage and an integral part of the IT infrastructure. However, it is this network connectivity, along with hard disk and memory storage, that means that MFPs are susceptible to the same security risks as PCs and servers. |
Thursday, January 10, 2008
Wednesday, January 9, 2008
Speaking about security
The audience got into it with zest and asked a number of great questions. They even proposed answers to their question; all I had to do was listen and smile.
Evaluating Your Computer Forensic Vendor
These recommendations, courtesy of Verizon's Stan Kang, can help your business move through the critical selection process...
Thursday, January 3, 2008
Hacking exercise
clipped from news.zdnet.com A Microsoft executive calls the ease with which two British e-crime specialists managed to hack into a Windows XP computer as both "enlightening and frightening."
|