Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Monday, June 11, 2012
About Internet / Network Security: Perimeter Security Special Edition
When you think about network security, you might forget about perimeter security and physical security, but they are stil important aspects of your overall security posture. A favorite hacker saying is "If I can touch it, I can own it" which means if they can have physical access to your computer or server then no amount of software safeguards (except for possibly strong encryption) will prevent them from circumventing your security. This week we focus on physical security. Check out the articles below for more info:
Defense-In-Depth is the concept of layering your defenses so that if one layer fails then you still have other layers in place to provide protection. Let's apply this concept to protecting your home computer... Read more
Phyiscal security is the outermost layer of your overall security posture. Our article on How to Zombie-proof Your Home will show your how to keep the undead and other assorted bad guys from feasting on your brains and your data as well...Read more
It's powerful, it's shiny, and everyone wants one, including thieves and hackers. Your MacBook holds your world: work files, music, photos, videos, and a lot of other stuff you care about, but is your MacBook safe and protected from harm? Let's take a look at 5 MacBook Security Tips you use to make your MacBook an impenetrable and unstealable mobile data fortress...Read more