Email Alerts
-
Public wireless networks present a raft of dangers
A company's end-users don't always have the luxury of a protected network, as many often leave the comfort of their guarded corporate environment and access the Internet from coffee shops, hotels, airports and other public areas. In this tip, Mike Ch... Tip
-
Eight top information security events of 2006
From WMF exploits to the Veterans Affairs data breach, information security threats were plentiful in 2006. In this tip, contributor Joel Dubin reviews what grabbed the attention of hackers in the information security world in 2006 and explains how t... Tip
-
IT compliance success doesn't equal security success
While compliance needs may help boost an information security department's budget, using the compliance card to receive more funding can cause more harm than good. In this tip, contributor Khalid Kark, Senior Analyst at Forrester Research explains wh... Tip
-
Database compliance demystified
As security professionals grapple with both federal mandates and industry-specific guidance, many wonder how best to approach these issues in terms of data protection and security. In this tip, James C. Foster looks at specific regulations such as SO... Tip
-
RFID security issues endanger companies and consumers
As the holiday season approaches, credit card purchases will undoubtedly increase. However, before waving your RFID-enabled credit card at the checkout of your favorite store, research suggests you may want to think twice. In this tip, Joel Dubin exa... Tip
-
Defensive measures for evolving phishing tactics
From image spam to cross-site scripting, hackers certainly have a large arsenal of weapons to choose from. But as AT&T recently learned, hackers are putting a new twist on ever-dependable phishing schemes to gain access to confidential and sensitive ... Tip
-
IT Infrastructure Library: Regulatory compliance benefits and training options
The IT Infrastructure Library (ITIL) can assist organizations in their regulatory compliance efforts. This article explains how and outlines training options for security practitioners interested in becoming ITIL certified. Tip
-
Laptop crypto: Do it, but realize it's not a panacea
Laptop encryption has its pros and cons. Find out how to use laptop crypto to keep your sensitive data secure -- even if it falls in the hands of the enemy. Tip
-
Telecommuting security: Protecting sensitive data inside and out
The rash of laptop thefts in recent months has brought telecommuting and remote access security to the forefront of many information security professionals' minds. In this tip, Joel Dubin examines the mistakes made in the VA data theft case and offer... Tip
-
Regulatory compliance: Sun shines on SB-1386
This case study reveals how Michelle Dennedy, Sun Microsystems chief privacy officer, tackled SB-1386 compliance by making it part of the corporate culture. Tip
Security Management Strategies for the CIO