Access "Embedded Security Safeguards Laptops"
This article is part of the June 2008 issue of Five crucial virtualization do's and don'ts
Secure From Within Embedded technology promises to make laptops tough targets. This spring's announcement that Intel will partner with BIOS vendor Phoenix Technologies to help implement its planned Anti-Theft Technology for Centrino-based laptops underscores the emerging role of hardware-based security, particularly in laptops and other mobile devices. Although details have yet to be announced, the partnership would leverage Phoenix's FailSafe product, which embeds policy-based protection against loss or theft in the BIOS. The idea, as with all Phoenix security technologies, is to enable security at startup, before the OS can be compromised. "Poor design of Windows leads to a lot of implementation flaws. We say when the first line of code in the BIOS executes, it sets up the secure environment for the agent," says Phoenix CTO Gaurav Banga. "We've raised the barrier against your laptop being hacked by a factor of a thousand. Security is not an afterthought but a forethought from the first election that moves on the system." Depending on the implementation and... Access >>>
Premium Content for Free.
Virtualization server security best practices
by Thomas Ptacek
Avoid server virtualization security bad practices with these dos and don'ts. Get info on virtualization products, segmentation, implementation, avoiding malware, and staging, deploying and patching virtual machines, segmentation and implementation.
Product review: Credant Mobile Guardian 6.0
Product review: Klocwork Insight 8.0
Embedded Security Safeguards Laptops
Tech Focus: Secure From Within
Security Awareness Employee Training Essential to Infosec Program
Security awareness training initiatives such as online tutorials, newsletters, MP3s and prizes get the security message across to users.
- Virtualization server security best practices by Thomas Ptacek
Spam blockers losing ground on sophisticated attackers
SPAM Spam hasn't been "solved"; in fact, the scourge has grown worse as attackers continually trump countermeasures and refine their focus on high-value targets.
Product review: Mu-4000 Security Analyzer
Product review: Array Networks SPX2000
Security Services: QualysGuard Security and Compliance Suite
At Your Service
GRC Tools Help Manage Regulations
GOVERNANCE, RISK AND COMPLIANCE We look at three GRC products and the distinct ways these tools can help organizations navigate the complicated regulatory game.
- Spam blockers losing ground on sophisticated attackers
CISOs Must Innovate to Enable Business
Editor's Desk: Be an Enabler
Architect Security and Compliance Programs to Be Complementary
Perspectives: Shake On It
Address Authentication and Transaction Validation Protocols to Stem Identity Theft
Layer8: Tarnishing Good Names
Interview: Financial Services CISO David Pollino
CISO Uses Predictive Analystics to Bolster Risk Management Program
- CISOs Must Innovate to Enable Business
More Premium Content Accessible For Free
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...