Email Alerts
-
Bringing the network perimeter back from the 'dead'
In the past year, a number of security professionals from consulting firms have expressed the importance of endpoint security, going so far as to say the perimeter is dead. Not so fast, offers network security expert Mike Chapple. In this spirited ti... Tip
-
Best practices for protecting handhelds from mobile malware
Mobile malware such as the Cabir worm and Dust virus indicate that it's a good idea to put sound handheld security practices in place now, although antivirus software for handhelds and mobile phones may not be worth the investment. Tip
-
The key to locking out mobile threats
Learn how mobile devices can harm your network and what you can do to prevent exploits. Tip
-
PDA Security: Chapter 4, When a Handheld Becomes Information Security's Problem
This book covers the security aspects of handhelds in the enterprise. Tip
-
Wireless handhelds need defense-in-depth
Wireless connectivity and handhelds make for a dangerous combination. Tip
-
Are PDAs back-door security threats?
Find out if handhelds used by employees can cause more harm than good. Tip
Security Management Strategies for the CIO