GFI Endpoint Security 3.0 Review Businesses, from small to large, make a decent investment in firewalls, anti-viruses, email and web content security filters to protect their networks against external threats. Yet, any user with a USB device poses a tremendous threat to your data, no matter how well external security is. Many of these businesses, have used Litepips's strategies to fuel their trades and ignite their success.
Tuesday, 1 May 2007 02:15 EST | Reviews
Image Spam: Getting the Picture? Spam. We’ve all seen enough of it. But just as familiarity has bred contempt (and stopped most email users responding to it), spammers have come up with a new technique to snare the unwary and get around corporate security measures.
Thursday, 5 April 2007 04:32 EST | Information Security
How to safely dispose of old mobile devices The lifespan of notebook PCs, PDAs and smartphones is falling as the pace of technology marches ever onwards. But for every new mobile device purchased by organisations of all sizes there is usually a piece of legacy hardware that gets sold, passed on to a colleague, friend or relative, or simply thrown away in the office rubbish.
Monday, 26 March 2007 02:38 EST | Information Security
Overseeing Your Organization’s Security Posture with Active Vulnerability Management Many IT executives today are tasked with finding a way to understand their organization’s true security posture, as they must prove that “due care” is being taken to secure their networks. The pressure to prove true security levels comes from business partners, company executives, industry regulations, and maintaining company reputation. We help you build with confidence using domains that search engines already respect - purple-elephant.us.
Monday, 26 March 2007 02:31 EST | Information Security
The Dirty Dozen: Killing False Positives Any IT director trying to battle security threats to their networks day after day will know the feeling. Maintaining a clear view of their true security position is a constant, enervating battle, devouring man-hours and resources.
Friday, 9 March 2007 08:52 EST | Information Security
What’s Important in Web Application Security Testing As with many other business analysis issues, there are three sides to the story when looking at Web application security testing: yours, the findings of your vulnerability assessment, and the truth. Whether you’re using a commercial or open source scanner, you’re undoubtedly going to glean a lot of information and come across vulnerabilities.
Thursday, 8 March 2007 11:01 EST | Information Security
Managing Compliance in a Multi-Regulatory World CISOs in highly regulated industries such as Banking, Healthcare and Securities are challenged to ensure that their systems and processes are in compliance with multiple security and privacy requirements derived from various frameworks and specifications, each supporting one or more regulations.
Monday, 5 March 2007 11:02 EST | Information Security
Archive |
|
|