Search

Your search keyword '"Thurman, Mathias"' showing total 89 results

Search Constraints

Start Over You searched for: Author "Thurman, Mathias" Remove constraint Author: "Thurman, Mathias" Topic computers Remove constraint Topic: computers
89 results on '"Thurman, Mathias"'

Search Results

1. Security manager's journal compliant, not secure: the effort to meet PCI Level 1 guidelines reveals a new security mantra to our manager

2. Money talks when you need to get things done

3. The perils of single sign-on

4. Security manager's journal of black hat and training: our manager digs deep into the issues at the hacker expo, then he tackles security awareness training back at the office

5. Security Manager's Journal: spotting vulnerabilities takes many eyes

6. Taking our breach response plan for a test-drive: our manager upgrades his company's incident response plan and gets ready to test it with all the people who will need to take action should a real breach ever hit

7. Taking a gander at the security landscape: as our manager settles in at his new job, he has begun to see security vulnerabilities everywhere he looks

8. Locking down the network our manager decides that, like users, resources on the network should adhere to the rule of least privilege

9. The heartburn of Heartbleed: our manager scrambles to find and fix any vulnerable resources after the OpenSSL flaw is discovered

10. A deal too good to be true: offshore coding vendor offers a great price for quality work, but it may be stealing the company's source code

11. Virtual machines, real mess: when internet and phone service goes down, the problem is traced to VM images installed in a classroom

12. Security managers journal: Vendors Can Make Us a Target The data breach suffered by Target could make It easier te make some needed changes at our manager's conrnm

13. Who's calling, please? An open port results in thousands of dollars in charges for international calls. Management hates that sort of thing

14. Eyes wide open on data loss: combining existing network data loss prevention with endpoint DLP will reveal more hidden network recesses

15. Security managers journal: siccing MDM on personal devices their use has gotten out of control. and mobile device managemer. will play we with deployed NAC

16. Server surfing is a big no-no: how could a tightly restricted server in finance be compromised by malware? Really it's not that hard

17. It's policy-tweaking time: no policy, no matter how well crafted, is immune from periodic review. Fall is when our manager tackles that

18. Found: servers that shouldn't be: they're Internet-facing, unpatched machines with no malware protection. How could that ever happen?

20. Email change opens many holes: migration to a new email platform wouldn't alter any of the security settings, our manager was assured. Wrong!

21. Security manager's journal: a cheap date for 2014 budget neither of our manger's two top security priorities for the coming year will break the bank

22. Data classes meet real world: company's policy on restricting data was sometimes too rigid, so a new category is born

23. Learning to let go and offshore: it was impossible security activities offshore. So far, it's working out well

24. Firewall audit gets prioritized: after a DDoS attack is discovered by chance, the audit can no longer wait until later in the year

25. Scrutinizing an acquisition: it's best when you can do a security review ahead of due diligence, but one will be essential at some point

26. Moving to better access control: a NAC initiative so far has revealed a whole lot of devices that don't meet the criteria for getting on the network

27. Plans are made to be revised: the company's incident-response plan needs to be updated. That's normal--no plan is carved in stone

28. A little security housecleaning: our manager finds the time and opportunity to cross a few nagging items off of his to-do list

29. Security lab is a promising step: the R&D department will have a sandbox for testing the company's software products. For once, security isn't last

30. Spam makes a comeback: out of the blue, phishing attacks previously caught in the spam filter are getting through to employee

31. Did DLP tool prevent an assault? A data loss prevention tool flags keywords that lead to the discovery of a possible conspiracy to commit a crime

32. When technologies collide: an encryption initiative runs into the law of unintended consequences: legal can't search encrypted emails

33. Tracking down rogue IT: the CIO wants to know if rogue IT is a problem. 'Probably,' says our manager. Now he has to find out how bad it is

34. Not-so-innocent distribution lists: an externally available email distribution list is spammed with a phishing attack. How many of those lists do we have?

35. A reality check for maturity: an assessment of the information security department shows that it still has a lot of growing up to do

36. Security extends to customers: when a security manager's company sells software, he can't ignore the potential vulnerability of those products

37. I hired a hacker: some cleaning up is needed after a third party's penetration testing uncovers some disturbing findings

38. DLP tool suddenly blind to email: data leak prevention can't be effective if it can't see any Exchange mail on the network. What happened?

39. Closing off an Outlook hole: with Outlook Anywhere, users can download their mail to untrusted PCs and leave sensitive documents behind

40. Ask, and hope to receive: our manager has a long wish list as the annual budget time rolls around once again

41. The sales rep & the honey tokens: a competitor suddenly seems to know a lot about the company's customers is a former employee involved?

42. Security manager's journal: on the lookout for rogue IT: a seemingly innocent request leads to the discovery of an unapproved, customer-facing SaaS application

43. Security manager's journal: red alert for child pornography a.mov file with a highly suggestive name is enough to kick off an investigation into what's on an employee's PC

44. A data center in the cloud: with the data center moving to various cloud configurations, server provisioning will be a concern

45. Security manager's journal

46. Getting validation at RSA: The annual conference offers a chance to compare notes with other security professionals

47. plugging a SaaS access hole

48. Security manager's journal: hackers call home, on our dime: someone is making calls costing thousands of dollars via the IP telephony setup in a small European office

49. You can't secure every home: unauthorized network access from home PCs has been widespread, and finding that out was just a fluke

50. BYOD planning gets a boost: a key technology to allow for the secure use of personal devices on the network is virtual desktop infrastructure

Catalog

Books, media, physical & digital resources