Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
April 2006

Security Survivor All-Stars

Security Survivor All-Stars Worming their way in A lesson in laptop larceny Putting the brakes on insiders Personally accountable Paying the price 8 tips to ensure Your customers' personally identifiable Information stays safe Security Survivor All-Stars Worming Their Way In Cybercriminals have a parasitic side, and it's not to be underestimated. If they can't bust through the network perimeter of an enterprise, they're just as likely to go through the front door aboard an unwitting and trusted customer or business partner. Enterprises like research information provider LexisNexis, for example, spend countless hours and resources on resolving malware issues, shoring up intrusion defenses and architecting security into the network. But admittedly, LexisNexis had done little to ensure that customer and partner environments with access to LexisNexis databases were secure. This was the avenue by which hackers last year stole more than 300,000 accounts with names, addresses, and Social Security and driver's license numbers. Granted ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Get a Grip!

    MOBILE SECURITY Enterprises need to take control of PDAs, smart phones and other mobile devices to ensure corporate security.

  • Transit Safety

    BITS & BOLTS SSL-encrypted tunnels protect sensitive data traveling the Information Superhighway.

  • E-mail Security

    Tumbleweed's MailGate 5500

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close