Search

Your search keyword '"Thurman, Mathias"' showing total 627 results

Search Constraints

Start Over You searched for: Author "Thurman, Mathias" Remove constraint Author: "Thurman, Mathias"
627 results on '"Thurman, Mathias"'

Search Results

201. Starting over, with intrusion detection: there's lots to do at our security manager's new job, but sometimes budget timelines set your priorities

202. Intellectual property is focus at new job: our security manager starts a new position with a mandate to keep company IP from walking out the door

203. User's end run around VPN leads to new push: a worm crawls into the network when the VPN is accessed improperly. What can be done to avoid a repeat?

204. IDS pays off, even if there's no hacking: system shows its value again as the security team sets out to mitigate the effects of a nasty worm

205. Lull in action is time to tie up loose ends: the blackout at the end of the quarter is a chance for documentation and evaluation of new technologies

206. More than a token overhaul of the VPN: a move to two-factor authentication gives our security manager a chance to secure his VPN infrastructure

209. Downtime becomes documentation time: our security manager takes advantage of a lull in the usual hectic pace to catch up on some important stuff

210. Security conference leads to new initiative: our security manager attends the RSA Conference and finds more than just buzz over virus gateways

212. Hollywood legal threat leads to detective work: a letter from the MPAA charges that an employee has violated copyright law. Our security manager has to figure out who the culprit is

213. SecurID rollout calls for planning: with two-factor authentication about to head out to the masses, a step-by-step plan is drawn up

214. VPN evolution progressing to SSL: one VPN technology is decommissioned, but the replacement causes problems. SSL offers some answers, but there are still issues to be resolved

215. Security bookshelf

216. Taking the leap to PEAP for wireless: access points are proliferating, but there still are no formal policies or standards in place. Someone has to keep an eye on things

217. Sarb-Ox project following script: as the deadline for compliance with the financial accountability act approaches, systems testing is coming along

218. IP telephony changes security equation: voice over IP presents challenges in protecting the corporate network

219. Company secrets hit the exits: it does no good to worry about hacker attacks if departing executives are free to leave with sensitive programs and data

220. Hackers and Painters: Big Ideas from the Computer Age

221. FTP server offers illicit goods: a random check of a public FTP server turns up an illegal distribution copy of Windows

222. Spyware gets top billing: an infection on the CEO's home system leads to a call for new preventive measures

223. Worm lays waste to IT's defenses: politics, project delays and an ineffective response allow for a Sasser disaster

224. Security policy a paper tiger: ignored security policies result in problems ranging from rogue access points to inadequate incident response

225. Failure to communicate dooms IDS alert process: an early warning goes unheeded, SQL Slammer worms its way in, and all hell breaks loose

226. Cheap scanning comes at a price: a global deployment of the free Nessus port-scanning software saves the budget but lacks the reports that management demands

227. Security tools search falls short: disk encryption and identity management products on display at the RSA Conference don't quite fit

228. Recommended reading

229. Overwhelmed by Sarbanes-Oxley: the security-related controls required for a successful compliance audit can be substantial

230. Postmerger audit quashes trust idea: the barriers stay up when a security audit reveals inadequate protections within a newly acquired start-up

232. Snort enhancements suppress IDS headaches: two new capabilities in the freely available Snort intrusion-detection system software prove their mettle in the field by reducing false alarms

233. Security bookshelf

235. Security log

239. Mop-up continues in worm aftermath: without automated tools in place, patch and virus signature update compliance become increasingly difficult to manage

241. Log Parser

242. Knowledge base boosts IT reports: an open-source tool makes an ideal repository for IT security support information

243. No denying new switch vulnerability: exploit code demonstrates how easily hackers can take advantage of a router security hole and launch denial-of-service attacks

244. Rogue Linux installs on the rise: virus mop-up operations expose unauthorized Linux installations--and new IT security Vulnerabilities

246. Security bookshelf. (Security Log)

249. Reserve call-up hits IT security department: when an IT security manager gets the call, the rest of the staff is left to pick up the pieces

250. Merger security hinges on gateway appliance: the best short-term fix for handling acquisitions may be to use an integrated security product. (Security Manager's Journal)

Catalog

Books, media, physical & digital resources