Access "Security Survivor All-Stars"
This article is part of the April 2006 issue of Security survivor all stars explain their worst data breaches
Security Survivor All-Stars Worming their way in A lesson in laptop larceny Putting the brakes on insiders Personally accountable Paying the price 8 tips to ensure Your customers' personally identifiable Information stays safe Security Survivor All-Stars Worming Their Way In Cybercriminals have a parasitic side, and it's not to be underestimated. If they can't bust through the network perimeter of an enterprise, they're just as likely to go through the front door aboard an unwitting and trusted customer or business partner. Enterprises like research information provider LexisNexis, for example, spend countless hours and resources on resolving malware issues, shoring up intrusion defenses and architecting security into the network. But admittedly, LexisNexis had done little to ensure that customer and partner environments with access to LexisNexis databases were secure. This was the avenue by which hackers last year stole more than 300,000 accounts with names, addresses, and Social Security and driver's license numbers. Granted it took a conflagration of ... Access >>>
Premium Content for Free.
Secure Reads: The Database Hacker's Handbook
Read a review of The Database Hacker's Handbook.
Recent Releases: Security product briefs, April 2006
Read about security products released in April 2006.
BITS & BOLTS SSL-encrypted tunnels protect sensitive data traveling the Information Superhighway.
Security Survivor All-Stars
COVER STORY Five security survivors tell you how to outwit, outplay and outlast the bad guys.
Antispyware / Patch Management
Shavlik Technologies' NetChk Protect 5.5
- Secure Reads: The Database Hacker's Handbook
Security Device Testing
Karalon's Traffic IQ Pro 1.0
Get a Grip!
MOBILE SECURITY Enterprises need to take control of PDAs, smart phones and other mobile devices to ensure corporate security.
Tumbleweed's MailGate 5500
Hot Pick: F5 Network's FirePass 4100 Controller
F5 Network's FirePass 4100 Controller
- Security Device Testing
Ping: Jane Scott Norris
Jane Scott Norris
Face-Off: Schneier, Ranum debate security awareness training
Is User Education Working?
Editor's Desk: The power of one
Perspectives: Putting out a call for self-defending clients
by M. W. Meyer & Eric Sager, Contributors
Network perimeter defenses have crumbled. What we need now are self-defending clients.
- Ping: Jane Scott Norris
More Premium Content Accessible For Free
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...