Infosec Island Security News Digest for 8-12-2010

Thursday, August 12, 2010

Infosec Island Admin

7fef78c47060974e0b8392e305f0daf0

3 Basic Elements to Network Forensics Solutions  The information forensic analysis provides can lead to an informed and efficient security posture within an organization to deter similar attacks in the future. As criminals get smarter and savvier, being able to detect and characterize attacks is crucial...

Gartner Review: Enterprise Digital Rights Management  Enterprise Digital Rights Management by Eric Quellet is a must read paper for any organization that is considering Enterprise Rights Management. It helps decision makers consider the implications of using ERM to protect intellectual property and how best to implement it...

Cutting Edge Cyber Security Training  It seems like every day we hear about another company losing important customer information or data, like social security numbers, to hackers or security breaches. Companies like to be in the news, but not with headlines like this...

IT Security History and Architecture - Part 1  Scant attention is paid to the serious vulnerabilities of software assets, e.g., the source code base, make files, module management systems, libraries, etc. due to poorly-planned access mechanisms and deployment...

Three minutes to data loss protection with Blue Coat  Data loss protection is still an evolving field, but Blue Coat brings a comprehensive solution that can be quickly configured to stop leaks of confidential data to unauthorized users. Is your data leaving with employees that are getting downsized? Is your customer list now the property of one of you...

Risks Of Phone Removal From University Dorm Rooms  There is no easy solution to this dire situation. Universities are forced to make cost cuts in this poor economy, and telecommunications overhead like dorm phones is a easy measure to take, but the increased risk and costs are at this point not worth it...

Virtual doors Keep Out the Uninvited  Your connected devices allow you the opportunity to literally bring the world to your doorstep. There exists unfortunately, a malicious minority of individuals, as well as, organized criminal entities which prey on those of us whose online virtual doors are invitingly open...

Bullet Proof Hosting: Strengths and Weaknesses  BP hosting, like other cyber-criminal activities, has proven highly adept at predicting and reacting to potential threats to their operations. This is demonstrated by the rapidity with which malicious domains repopulate despite being taken down or having their preferred ISPs shut down...

Office 2010 Reaches for the Cloud  Office 2010 is also Microsoft’s latest foray into integrating with Cloud computing! This means you never have to be far away from your documents, nor are your collaborators even if they do not have Office 2010 installed on their systems...

InfosecIsland.com is a vendor-neutral professional community committed to serving the needs of SMBs and mid-market enterprises, and large corporations across multiple industries, government agencies, educational organizations, legal, financial, and healthcare sectors. Memberhsip is free - join today!

Possibly Related Articles:
4721
Infosec Island
Infosec Island
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.