Enjoy lower spam levels while they last It's kind of like the "war on drugs": Lock up one dealer and it's not long before another seizes the business opportunity. Networking Geek to Geek with Jimmy Ray Purser: 10 Tips for creating your own small hackers group 1. Be of like interest. 2. Keep it small. 3. Define an objective. More tips. Advice to the next Homeland Security CPO If you had a chance to pose any question to the person in charge of protecting Americans' privacy as the U.S. Department of Homeland Security executes its mission, what would you say? I had that chance this month when Hugo Teufel, departing chief privacy officer at the DHS, delivered an address, entitled "Reflections on My Time as DHS CPO of the War on Terror," to the Twin Cities Privacy Retreat. Gemalto warns against dangerous IT security complacency Digital security firm Gemalto has warned of the risks of the common complacency, across the Asia Pacific, about internet security, despite it being a 'hot region for phishing attacks'. Data Breach at Heartland May Be Bigger Than TJX's A data breach disclosed last week by Heartland Payment Systems Inc. may displace the one revealed by The TJX Companies Inc. in January 2007 as the largest compromise of payment card information to date. Windows 7 Security Features Get Tough Two years after Windows Vista debuted, many companies have yet to upgrade. And in many instances their reluctance to migrate to Vista stemmed from concern about security. New Apple Trojan slays Adobe pirates The Trojan that was being distributed last week in pirated copies of Apple's iWork 09 program on BitTorrent has reappeared only days later hiding inside copies of Adobe Photoshop CS4. Reflex offers secure virtual systems management Reflex Security updates its name to Reflex Systems, combines virtual security technology with new virtual systems management tools. Exploring Disaster Recovery Options Now that my disaster recovery budget for 2009 has been wiped out, I'm trying to find some kind of replacement that won't cost any money upfront. I can't in good conscience sit idly by while we roll out critical services without the safety net of DR -- that's like watching a friend drive without a seat belt. Maybe there's a very good chance that nothing bad will happen, but if something does go wrong, the consequences can be so severe that the overall risk is beyond acceptance. Enjoy lower spam levels while they last It's kind of like the "war on drugs": Lock up one dealer and it's not long before another seizes the business opportunity. Author Expert: Scott Hogg: Practical BGP security While you wait for the slow-moving big wheels of the Internet to move we need to have some way of protecting ourselves from the current set of threats. Fortunately, there are many things you can do to secure your BGP connections. Enable BIOS Passwords for Extra Security Your PC likely asks for your username and password to grant access to Windows, a nice security measure, but ineffective if someone has physical access to your hard drive. (They'll just install it in another PC and boot from a different disk.) You should enable hard drive encryption for the best protection against data thieves. But also use additional BIOS tricks enable more layers of security, asking for another password to boot, access the drive, or change BIOS settings. Here's how to adjust those system settings. Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment