Weigh the pros and cons of technologies, products and projects you are considering.
Digital rights management technology not only protects and controls electronically distributed data, but also is a flexible enterprise solution that can lessen security breaches. Continue Reading
Although efficient study guides for cramming before the CISSP test, The CISSP Prep Guide and the CISSP Exam Cram won't advance the infosec profession and are likely plagiarized. Continue Reading
JP Vossen explains how Windows command line scripts and the GUI shell can be used to improve security. Continue Reading
Marcus Ranum's Network Flight Recorder was poised as a forensics tool when the market demanded IDSes -- so it adapted accordingly. Continue Reading
Network traffic capture, sophisticated analysis and forensics capabilities make network forensics analysis tools useful in making security assumptions and allocating resources. Continue Reading
Inconsistencies and awkward definitions plague Malicious Mobile Code, according to reviewer Jay Heiser.Continue Reading
Enterprise access management products offer solutions that are anything but plug-and-play. But with enough time and elbow grease, they can become a critical part of your Web access infrastructure.Continue Reading