Though most U.S. companies still list customer and other corporate information as their most valuable assets, many keep pushing this data farther from safe lockdown in the data center--and are about to give it another strong shove in that direction.
Kevin Fogarty |
18 May |
Read more
Firewall audit tools automate the otherwise all-but-impossible task of analyzing complex and bloated rule sets to verify and demonstrate enterprise access controls and configuration change-management processes.
Neil Roiter |
12 May |
Read more
Cell phones, texting, IM, email, Facebook, MySpace--kids are interconnected today in ways hardly imagined two decades ago. But these technology-based communication platforms also enable new forms of an age-old parenting strategy: monitoring your kids. Who are they talking to? What are they talking about? Are they going where they said they are going?
Joan Goodchild |
15 Apr |
Read more
The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools ever really useful to begin with?
Bill Brenner |
25 Mar |
Read more
Biometrics encompasses a variety of methods for ensuring identity based on physical or behavioral traits. Conventional identifying traits include fingerprints, face topology, iris structure, hand geometry, vein structure, voice, signature and keystroke recognition. Emerging technologies analyze characteristics such as gait, odor, and ear shape. Rather than being used in isolation, biometrics systems are increasingly becoming multimodal, an approach that serves both to increase security and overcome failure-to-enroll problems.
Mary Brandel |
25 Mar |
Read more
Considering a biometric access system? Experts offer practical advice in these dos and don'ts.
Mary Brandel |
18 Mar |
Read more
The Project: Deploy mobile communications software to enable transmission of live video to and from the Port of Los Angeles' control centers and harbor police in the field. The project is part of a $4.2 million integrated command console system designed to improve security responsiveness at the nation's busiest cargo port.
Stephanie Overby |
28 Jan |
Read more
The head of the U.S. Federal Bureau of Investigation has stopped banking online after nearly falling for a phishing attempt.
Robert McMillan |
08 Oct |
Read more
The relaunch of the popular online game World of Warcraft in China, where it has already been offline for six weeks, still faces an indefinite delay as it awaits government approval for its content.
Owen Fletcher |
20 Jul |
Read more
Visa and NeuStar have joined forces and formed an alliance that it hopes will help accelerate the adoption of mobile financial services globally, they said on Tuesday.
Mikael Ricknäs |
24 Jun |
Read more
Chris Nickerson is willing to push it about as far as a person can go when it comes to security assessments. The founder of Lares, a security consultancy in Colorado, Nickerson conducts what he calls "Red Team Assessments" for clients. He is paid to try and dupe a client, and the client's employees, to give them a clear picture of the weak spots in their security plan. He then advises them on how to shore up defenses more effectively in the event a real criminal comes knocking.
Joan Goodchild |
08 Jun |
Read more
The U.S. government needs to spend more money on cybersecurity research and development and on education programs in order to fight a rising tide of attacks against government and private groups, cybersecurity experts told U.S. lawmakers.
Grant Gross |
11 Jun |
Read more
If you think the biggest threat to your sensitive information lies in network security, think again. Once a criminal is inside a building, there are limitless possibilities to what that person can access or damage. Take a look at your building's security. How easy is it to get inside?
Joan Goodchild |
10 Jun |
Read more
In one of the more famous episodes of the original "Star Trek" series - "The Trouble With Tribbles" - Capt. Kirk confines Chief Engineer Montgomery Scott to his personal quarters for getting into a bar fight.
Bill Brenner |
10 Jun |
Read more
Websense CTO Dan Hubbard outlines four ways companies can protect their information from threats and compromise on the social Web.
Dan Hubbard |
06 Jun |
Read more
Moving to a nearly fully-virtualized infrastructure in 2008 made Joel Braverman a lot more confident in both the physical and digital IT infrastructure at his (relatively new) employer Universal Audio. As manager of IT and the guy responsible for security on that infrastructure-one that supports a company whose products are both expensive and almost entirely digital-it also made him extremely nervous, he says.
Kevin Fogarty |
04 Jun |
Read more
How business practices have changed the risky activity on your network.
Jeff Prince |
19 Mar |
Read more
Imperva's Amichai Shulman looks at database attack and defense.
Amichai Shulman |
23 Feb |
Read more
Your identity is like George Costanza's wallet. Really. Think about it. Do you remember the classic Seinfeld episode? The one where George wouldn't give up his ever-expanding wallet filled with store credit cards, Irish money, a coupon for an Orlando Exxon gas station and several Sweet and Low packets. This, in spite of the obvious physical pain it caused and the security threat all of that imposed.
David Miller |
11 Feb |
Read more
Salesmen and parents know the technique well. It's called the takeaway, and as far as Keith Mularski is concerned, it's the reason he kept his job as administrator of online fraud site DarkMarket.
Robert McMillan |
21 Jan |
Read more