Archive

Archive for August, 2005

Businesses Ignoring Email Security Risk

August 25th, 2005
Comments Off on Businesses Ignoring Email Security Risk

Businesses are ignoring an obvious security flaw in their outbound email management policies, according to findings of a new research. More than half of businesses do not take any actions to protect against improper sending of confidential emails.
Read more…

Articles

Implementing Principle of Least Privilege

August 24th, 2005
Comments Off on Implementing Principle of Least Privilege

The Principle of Least Privilege is not a new concept, but the push to implement it on production networks has never been so important. This article will go over some of the most common configurations that you can make to implement these principles and reduce the possibility of an attack from a typical end user.
Read more…

Articles

Spam, Viruses Tops IT Security Concerns

August 23rd, 2005
Comments Off on Spam, Viruses Tops IT Security Concerns

Small and medium sized enterprises in 2005 are most concerned of spam and virus attacks and are prepared to spend as needed to bolster their protection, according to findings of a study examined top IT security fears among small businesses.
Read more…

Articles

Air Force under Identity Theft Attack

August 23rd, 2005
Comments Off on Air Force under Identity Theft Attack

Attackers successfully managed to break into a military computer database and steal private information, social security numbers on roughly 33,000 Air Force officers. The breach put Air Force at a greater risk of possible identity fraud attack.
Read more…

Articles

One-Stop Security

August 23rd, 2005
Comments Off on One-Stop Security

Confusion, fear, procrastination; these are words often associated with making decisions about IT security and as threats become more sophisticated it is easy to see why. The increasing popularity for workforce mobility and remote networking have made detecting and eliminating threats purely from within the corporate network alone an inadequate approach to network security.
Read more…

Articles

GreenBorder Launches North American Partner Program for Industry’s First “Desktop DMZ” Software for Windows

August 22nd, 2005
Comments Off on GreenBorder Launches North American Partner Program for Industry’s First “Desktop DMZ” Software for Windows

Program Enables Resellers to Grow Their Business by Bringing Innovative, Enterprise Class Protection to Mid-Tier Companies
Read more…

Releases

Case Study: Choosing Network Monitoring Software

August 22nd, 2005
Comments Off on Case Study: Choosing Network Monitoring Software

Blue Cross and Blue Shield of Hawaii found itself with a rapidly expanding network and data center. Our network devices, servers, and software were all growing in complexity and we knew that we would have to leverage technology to gain better control of our IT systems and network.
Read more…

Articles

NSA PDA for the Government

August 22nd, 2005
Comments Off on NSA PDA for the Government

General Dynamics inked an $18 million contract with the U.S. secretive Nation Security Agency to design and develop a secure mobile personal assistant for defense workers. The PDA will integrate all type of communications it in including voice, data and web.
Read more…

Articles

Consumers Show Security Concerns

August 22nd, 2005
Comments Off on Consumers Show Security Concerns

The findings of a survey commissioned by RSA Security reveal an improvement in consumer’s awareness to online security concerns. The survey examined the willingness for better authentication and the impact of the authentication used by businesses on their consumers.
Read more…

Articles

Protecting Data To Deliver Business Value

August 22nd, 2005
Comments Off on Protecting Data To Deliver Business Value

The exponential growth of business data has dramatically changed the way in which information is viewed, stored and accessed, directly impacting the way in which the information lifecycle is managed today. Over 98% of all business information today exists in digital form.
Read more…

Articles