Data security: Why the usual solutions fall short
Data security: Why the usual solutions fall short
Shon Harris and other team members would like to share with you the CISSP and information security articles and materials we have published for various periodicals.
Data security: Why the usual solutions fall short
With the current buzz around the WikiLeaks disclosures, the U.S. public seems amazed by the type and amount of sensitive information that is available to people who should not have access to it. Security professionals are not.
Smart Grid Security Overview
A "smart grid" refers to the traditional electric power grid updated with modern information technology equipment and knowhow. It is comprised of digitized devices and the industrial facilities in the energy sector that such devices help operate: electrical plants, electrical substations, utility towers, relays, and transformers, nuclear power plants, and oil refineries.
Shortages in Federal Government's Cyber Security Work Force
Two new reports--from the Center for Strategic and International Studies (CSIS), and from the consulting firm Booz Allen and the non-profit Partnership for Public Service (PPS)--highlight serious shortfalls among the federal government's cyber security work force. Against a background of growing threats to the IT infrastructure of the U.S. military, civilian federal agencies, and major private-sector firms, the reports find common ground on short- and longer-term recommendations for grappling with this pressing concern.
Data Loss Prevention: Best Practices for Protecting Your Most Valuable Asset
For years IT organizations have focused on securing the computer network. Technologies such as firewalls and network access control (NAC) are designed to keep malware and unauthorized traffic from coming in. That makes sense from an operational integrity standpoint. Viruses, worms, spam, phishing attacks, etc. can bring a network to a standstill. But, while the focus has been on keeping bad traffic out, data packets have moved freely for the most part through and beyond the private network. After all, that's what the network is for. It plays a supporting role to the star of the show: your data. Without data, there's little need for a network. But therein lies the rub!
Learning from SQL Slammer
Many people might have heard of the Slammer worm, but few people fully understand the root of the attack. Familiarizing yourself with Slammer's methods can help you evaluate the risk to your environment and prepare for future attacks by similar worms.
Greater WLAN Security with 802.11i
To improve the standard and close holes in current wireless implementations, IEEE developed the 802.11i Task Group. To address each of the aforementioned flaws, this group has developed a new authentication framework that encompasses several components.
How 802.11i Addresses WEP's Core Deficiencies
Wired Equivalent Privacy (WEP) contains three core deficiencies. The first deficiency is the use of static encryption keys. The second deficiency is the ineffective use of initialization vectors (IVs). The third deficiency is the lack of packet integrity assurance.
Vulnerability Mismanagement
The following are seven must-have elements of a successful vulnerability management program. They're not about scanning or applying patches; they're the essentials that will enable you to efficiently and effectively find and remediate vulnerabilities
Why Global Data Entry is high in demand? Amazing Photo Recovery Program for Mac and PC Just how Forms Data Capture Works Some Helpful Data On The Previous Airbender Verizon Dropping Unlimited Data, Switching to Tiered Plans This Summer Data -Mining Is your data secure? Not too sure? Accounts Payable Recovery Web Extraction Tools the Ultimate Data Collection Approach Global Data: Partnerships, Licensing, Investments and M&A Deals and Trends in Pharmaceuticals Export of Malaysia timber poised for recovery in 2010 Data centers – Factors that help you decide the best solution The power behind data transfers that builds companies