Information security and the outsider, Part 1 In a world of new, unconventional military conflict around the globe, one of the largest producers of secure information, the U.S. government, has had to create non-traditional partnerships to help accomplish domestic missions. In this two-part series, guest writer Lt. Col. Robert E. Jennings, vice commander of the New Jersey Wing of the Civil Air Patrol and a leader of the service delivery managers in Dell's ProSupport organization, looks at how the government is working with semi-official volunteer organizations. In part 2, he provides a case study of how one of those organizations adapted to provide better information security for their new assignments. Searching for the digital needle in a relational hackstack Let me share a few of the tools I use to help customers identify their possible exposure to information theft. 17 High-Risk Security Threats (And How to Fix Them) Network worms. Phishing e-mail. Drive-by downloads. Data sniffed from an open wireless network. To use a computer safely in the 21st century, you have to be prepared to combat a growing number of constantly evolving security threats. Plus: 17 High-Risk Security Threats (And How to Fix Them) How to Stop Operating-System Attacks How to Lock Down the Data in Your Apps How to Safeguard Your Online Security How to Beat Card Skimmer Scams, Other Money Drains How to Plug Security Holes in Your Browser How to Keep Your Cell Phone Info Private How to Protect Your Online Passwords Stop data leaks Yes, you can keep sensitive data from leaving your organization. Our revamped Product Guide tells you what you need to know, including 5 questions to ask data-leak protection vendors before buying. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment