• June 05, 2007 05 Jun'07

    What are the best security practices for securing sensitive data on PDAs?

    In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin discusses several ways of securing sensitive data on PDAs, such as establishing an acceptable use policy and practicing data encryption.  Continue Reading

  • June 05, 2007 05 Jun'07

    Gartner: Making the case for enterprise security architectures

    Gartner IT Security Summit: An enterprise security architecture is an important part of a long term strategy and can help mitigate the risks when data is used in new ways.  Continue Reading

  • June 05, 2007 05 Jun'07

    What are the potential risks of giving remote access to a third-party service provider?

    In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin discusses the potential risks involved with providing remote access to a third-party service provider.  Continue Reading

  • June 04, 2007 04 Jun'07

    van Eck phreaking

    Van Eck phreaking is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring and picking up the electromagnetic fields (EM fields) that are produced by the ...  Continue Reading

  • June 04, 2007 04 Jun'07

    TACACS

    TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can ...  Continue Reading

  • June 04, 2007 04 Jun'07

    Terminal Access Controller Access Control System

    TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can ...  Continue Reading

  • June 04, 2007 04 Jun'07

    user profile

    In a Windows environment, a user profile is a record of user-specific data that define the user's working environment.  Continue Reading

  • June 04, 2007 04 Jun'07

    TACACS (Terminal Access Controller Access Control System)

    TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can ...  Continue Reading

  • June 04, 2007 04 Jun'07

    spoof

    Spoof was a game involving trickery and nonsense that was invented by an English comedian, Arthur Roberts, prior to 1884, when it is recorded as having been "revived.  Continue Reading

  • June 04, 2007 04 Jun'07

    spam trap

    A spam trap is the inclusion of an option in an online form that is preselected by default with the expectation that the user will fail to notice the option.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close