Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Wednesday, July 08, 2009
Protecting Social Security Numbers online is a futile exercise
Social Security Numbers are predictable, Carnegie Mellon researchers find; Norton Internet Security 2010 beta: Different approach, new features, some glitches
How to maintain security without increasing the operational load on IT staff A number of factors are increasing the challenges of keeping networks secure. One source is additional users of varying types -- including some with multiple roles -- coming onto the network. IT staff finds it must support remote workers, guests, contractors, partners, suppliers -- sometimes even competitors -- on the LAN and yet still protect sensitive corporate assets.
July Giveaways Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.
Get the Most from Exchange 2007 Read this whitepaper to discover the changes that have the greatest impact on storage and a reexamination of best practices for designing Exchange storage. Click here to read more.
Keep Storage Costs in Check with Tape The Clipper Group outlines the real costs of migrating to a disk-based storage. You will learn about the dramatic differences between tape-based and disk-based storage in regards to floor space, hardware and energy costs. Find out why tape storage, especially, LTO-4, should be part of your long-term storage plans. Keep Storage Costs in Check with Tape