Search

Your search keyword '"Thurman, Mathias"' showing total 103 results

Search Constraints

Start Over You searched for: Author "Thurman, Mathias" Remove constraint Author: "Thurman, Mathias" Topic data security issue Remove constraint Topic: data security issue
103 results on '"Thurman, Mathias"'

Search Results

1. Security manager's journal compliant, not secure: the effort to meet PCI Level 1 guidelines reveals a new security mantra to our manager

2. Money talks when you need to get things done

3. The perils of single sign-on

4. Security manager's journal of black hat and training: our manager digs deep into the issues at the hacker expo, then he tackles security awareness training back at the office

5. Security Manager's Journal: spotting vulnerabilities takes many eyes

6. Taking our breach response plan for a test-drive: our manager upgrades his company's incident response plan and gets ready to test it with all the people who will need to take action should a real breach ever hit

7. Taking a gander at the security landscape: as our manager settles in at his new job, he has begun to see security vulnerabilities everywhere he looks

8. Authentication Rollout Turns Into Control Issue

9. ThisWeek'sGlossary

10. What Do You Do When You're Nipped by Nimda?

11. Virus Attacks Can Enter Through Many Doors

12. Vulnerability Draws Yawn From Operations

13. Making the Airwaves Safe For Corporate E-Mail Users

14. Terrorist Worries Force Top-Down Security Review

15. ThisWeek'sGlossary

16. Security Review Gets No Respect From Managers

17. Big Firm's Security Gets Large-Scale Overhaul

18. Even Security Managers Get the Dot-com Blues

19. On the Trail of an Elusive Trojan Horse

20. Server Lockdown Locks Out End Users

21. When Good Security Leads to Poor Performance

22. Zen and the Art of Intrusion Detection

23. ThisWeek'sLinks

24. 'I Hired a Hacker': A Security Manager's Confession

25. New Security Manager Starting at Ground Zero

26. The heartburn of Heartbleed: our manager scrambles to find and fix any vulnerable resources after the OpenSSL flaw is discovered

27. Security managers journal: Vendors Can Make Us a Target The data breach suffered by Target could make It easier te make some needed changes at our manager's conrnm

28. Eyes wide open on data loss: combining existing network data loss prevention with endpoint DLP will reveal more hidden network recesses

29. Security managers journal: siccing MDM on personal devices their use has gotten out of control. and mobile device managemer. will play we with deployed NAC

30. Server surfing is a big no-no: how could a tightly restricted server in finance be compromised by malware? Really it's not that hard

31. It's policy-tweaking time: no policy, no matter how well crafted, is immune from periodic review. Fall is when our manager tackles that

32. Found: servers that shouldn't be: they're Internet-facing, unpatched machines with no malware protection. How could that ever happen?

34. Email change opens many holes: migration to a new email platform wouldn't alter any of the security settings, our manager was assured. Wrong!

35. Security manager's journal: a cheap date for 2014 budget neither of our manger's two top security priorities for the coming year will break the bank

36. Data classes meet real world: company's policy on restricting data was sometimes too rigid, so a new category is born

37. Learning to let go and offshore: it was impossible security activities offshore. So far, it's working out well

38. Firewall audit gets prioritized: after a DDoS attack is discovered by chance, the audit can no longer wait until later in the year

39. Plans are made to be revised: the company's incident-response plan needs to be updated. That's normal--no plan is carved in stone

40. A little security housecleaning: our manager finds the time and opportunity to cross a few nagging items off of his to-do list

41. Security lab is a promising step: the R&D department will have a sandbox for testing the company's software products. For once, security isn't last

42. Spam makes a comeback: out of the blue, phishing attacks previously caught in the spam filter are getting through to employee

43. Did DLP tool prevent an assault? A data loss prevention tool flags keywords that lead to the discovery of a possible conspiracy to commit a crime

44. When technologies collide: an encryption initiative runs into the law of unintended consequences: legal can't search encrypted emails

45. Tracking down rogue IT: the CIO wants to know if rogue IT is a problem. 'Probably,' says our manager. Now he has to find out how bad it is

46. A reality check for maturity: an assessment of the information security department shows that it still has a lot of growing up to do

47. I hired a hacker: some cleaning up is needed after a third party's penetration testing uncovers some disturbing findings

48. DLP tool suddenly blind to email: data leak prevention can't be effective if it can't see any Exchange mail on the network. What happened?

49. Ask, and hope to receive: our manager has a long wish list as the annual budget time rolls around once again

50. The sales rep & the honey tokens: a competitor suddenly seems to know a lot about the company's customers is a former employee involved?

Catalog

Books, media, physical & digital resources