103 results on '"Thurman, Mathias"'
Search Results
2. Money talks when you need to get things done
3. The perils of single sign-on
4. Security manager's journal of black hat and training: our manager digs deep into the issues at the hacker expo, then he tackles security awareness training back at the office
5. Security Manager's Journal: spotting vulnerabilities takes many eyes
6. Taking our breach response plan for a test-drive: our manager upgrades his company's incident response plan and gets ready to test it with all the people who will need to take action should a real breach ever hit
7. Taking a gander at the security landscape: as our manager settles in at his new job, he has begun to see security vulnerabilities everywhere he looks
8. Authentication Rollout Turns Into Control Issue
9. ThisWeek'sGlossary
10. What Do You Do When You're Nipped by Nimda?
11. Virus Attacks Can Enter Through Many Doors
12. Vulnerability Draws Yawn From Operations
13. Making the Airwaves Safe For Corporate E-Mail Users
14. Terrorist Worries Force Top-Down Security Review
15. ThisWeek'sGlossary
16. Security Review Gets No Respect From Managers
17. Big Firm's Security Gets Large-Scale Overhaul
18. Even Security Managers Get the Dot-com Blues
19. On the Trail of an Elusive Trojan Horse
20. Server Lockdown Locks Out End Users
21. When Good Security Leads to Poor Performance
22. Zen and the Art of Intrusion Detection
23. ThisWeek'sLinks
24. 'I Hired a Hacker': A Security Manager's Confession
25. New Security Manager Starting at Ground Zero
26. The heartburn of Heartbleed: our manager scrambles to find and fix any vulnerable resources after the OpenSSL flaw is discovered
27. Security managers journal: Vendors Can Make Us a Target The data breach suffered by Target could make It easier te make some needed changes at our manager's conrnm
28. Eyes wide open on data loss: combining existing network data loss prevention with endpoint DLP will reveal more hidden network recesses
29. Security managers journal: siccing MDM on personal devices their use has gotten out of control. and mobile device managemer. will play we with deployed NAC
30. Server surfing is a big no-no: how could a tightly restricted server in finance be compromised by malware? Really it's not that hard
31. It's policy-tweaking time: no policy, no matter how well crafted, is immune from periodic review. Fall is when our manager tackles that
32. Found: servers that shouldn't be: they're Internet-facing, unpatched machines with no malware protection. How could that ever happen?
33. Ins and outs of extending DLP: data leak prevention has paid off, but 40% of the company's global workforce remains uncovered
34. Email change opens many holes: migration to a new email platform wouldn't alter any of the security settings, our manager was assured. Wrong!
35. Security manager's journal: a cheap date for 2014 budget neither of our manger's two top security priorities for the coming year will break the bank
36. Data classes meet real world: company's policy on restricting data was sometimes too rigid, so a new category is born
37. Learning to let go and offshore: it was impossible security activities offshore. So far, it's working out well
38. Firewall audit gets prioritized: after a DDoS attack is discovered by chance, the audit can no longer wait until later in the year
39. Plans are made to be revised: the company's incident-response plan needs to be updated. That's normal--no plan is carved in stone
40. A little security housecleaning: our manager finds the time and opportunity to cross a few nagging items off of his to-do list
41. Security lab is a promising step: the R&D department will have a sandbox for testing the company's software products. For once, security isn't last
42. Spam makes a comeback: out of the blue, phishing attacks previously caught in the spam filter are getting through to employee
43. Did DLP tool prevent an assault? A data loss prevention tool flags keywords that lead to the discovery of a possible conspiracy to commit a crime
44. When technologies collide: an encryption initiative runs into the law of unintended consequences: legal can't search encrypted emails
45. Tracking down rogue IT: the CIO wants to know if rogue IT is a problem. 'Probably,' says our manager. Now he has to find out how bad it is
46. A reality check for maturity: an assessment of the information security department shows that it still has a lot of growing up to do
47. I hired a hacker: some cleaning up is needed after a third party's penetration testing uncovers some disturbing findings
48. DLP tool suddenly blind to email: data leak prevention can't be effective if it can't see any Exchange mail on the network. What happened?
49. Ask, and hope to receive: our manager has a long wish list as the annual budget time rolls around once again
50. The sales rep & the honey tokens: a competitor suddenly seems to know a lot about the company's customers is a former employee involved?
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.