627 results on '"Thurman, Mathias"'
Search Results
202. Intellectual property is focus at new job: our security manager starts a new position with a mandate to keep company IP from walking out the door
203. User's end run around VPN leads to new push: a worm crawls into the network when the VPN is accessed improperly. What can be done to avoid a repeat?
204. IDS pays off, even if there's no hacking: system shows its value again as the security team sets out to mitigate the effects of a nasty worm
205. Lull in action is time to tie up loose ends: the blackout at the end of the quarter is a chance for documentation and evaluation of new technologies
206. More than a token overhaul of the VPN: a move to two-factor authentication gives our security manager a chance to secure his VPN infrastructure
207. Protecting the crown jewels: our security manager explores the options for securing a valuable asset--the company's source code
208. Firewall request gets third degree: our security manager must conduct due diligence before allowing a partner company to transfer data
209. Downtime becomes documentation time: our security manager takes advantage of a lull in the usual hectic pace to catch up on some important stuff
210. Security conference leads to new initiative: our security manager attends the RSA Conference and finds more than just buzz over virus gateways
211. Assessing a new app infrastructure: before Web-based applications can be deployed, our security manager has to find the vulnerabilities
212. Hollywood legal threat leads to detective work: a letter from the MPAA charges that an employee has violated copyright law. Our security manager has to figure out who the culprit is
213. SecurID rollout calls for planning: with two-factor authentication about to head out to the masses, a step-by-step plan is drawn up
214. VPN evolution progressing to SSL: one VPN technology is decommissioned, but the replacement causes problems. SSL offers some answers, but there are still issues to be resolved
215. Security bookshelf
216. Taking the leap to PEAP for wireless: access points are proliferating, but there still are no formal policies or standards in place. Someone has to keep an eye on things
217. Sarb-Ox project following script: as the deadline for compliance with the financial accountability act approaches, systems testing is coming along
218. IP telephony changes security equation: voice over IP presents challenges in protecting the corporate network
219. Company secrets hit the exits: it does no good to worry about hacker attacks if departing executives are free to leave with sensitive programs and data
220. Hackers and Painters: Big Ideas from the Computer Age
221. FTP server offers illicit goods: a random check of a public FTP server turns up an illegal distribution copy of Windows
222. Spyware gets top billing: an infection on the CEO's home system leads to a call for new preventive measures
223. Worm lays waste to IT's defenses: politics, project delays and an ineffective response allow for a Sasser disaster
224. Security policy a paper tiger: ignored security policies result in problems ranging from rogue access points to inadequate incident response
225. Failure to communicate dooms IDS alert process: an early warning goes unheeded, SQL Slammer worms its way in, and all hell breaks loose
226. Cheap scanning comes at a price: a global deployment of the free Nessus port-scanning software saves the budget but lacks the reports that management demands
227. Security tools search falls short: disk encryption and identity management products on display at the RSA Conference don't quite fit
228. Recommended reading
229. Overwhelmed by Sarbanes-Oxley: the security-related controls required for a successful compliance audit can be substantial
230. Postmerger audit quashes trust idea: the barriers stay up when a security audit reveals inadequate protections within a newly acquired start-up
231. Stepping up to Sarbanes-Oxley: when it comes to compliance, some aspects of meeting the law's requirements may fall to the IT security group
232. Snort enhancements suppress IDS headaches: two new capabilities in the freely available Snort intrusion-detection system software prove their mettle in the field by reducing false alarms
233. Security bookshelf
234. Single sign-on effort falls short: with no input from IT security, a system is adopted that leaves out some apps and creates headaches
235. Security log
236. Security policies? What security policies? Without active follow-ups, security policies go unread, educational programs fade away, and viruses come roaring back
237. Rogue access point leads to embarrassment: an unauthorized and undetected wireless access point lets a visitor into the corporate LAN
238. Child porn gets by filters; feds follow: an employee sharing child pornography online eludes detection--until investigators arrive
239. Mop-up continues in worm aftermath: without automated tools in place, patch and virus signature update compliance become increasingly difficult to manage
240. Corporate network blasted from abroad: a poorly configured overseas office network allows a worm to slip inside the corporate LAN defenses
241. Log Parser
242. Knowledge base boosts IT reports: an open-source tool makes an ideal repository for IT security support information
243. No denying new switch vulnerability: exploit code demonstrates how easily hackers can take advantage of a router security hole and launch denial-of-service attacks
244. Rogue Linux installs on the rise: virus mop-up operations expose unauthorized Linux installations--and new IT security Vulnerabilities
245. Mumu worm makes a mess: a worm leaves its mark-and exposes security deficiencies at remote offices. (Security Manager's Journal)
246. Security bookshelf. (Security Log)
247. IT security confronts new legal liabilities: upcoming legislation and changing threats prompt our cautious security manager to double-check the corporate liability policy. (Security Manager's Journal)
248. Single sign-on stalls as Kazaa gets the boot: numeric user names derail directory integration work, but a network redesign enables blocking of bandwidth-hogging file-swapping programs. (Security Manager's Journal)
249. Reserve call-up hits IT security department: when an IT security manager gets the call, the rest of the staff is left to pick up the pieces
250. Merger security hinges on gateway appliance: the best short-term fix for handling acquisitions may be to use an integrated security product. (Security Manager's Journal)
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.