Search

Your search keyword '"Thurman, Mathias"' showing total 627 results

Search Constraints

Start Over You searched for: Author "Thurman, Mathias" Remove constraint Author: "Thurman, Mathias"
627 results on '"Thurman, Mathias"'

Search Results

2. Security manager's journal compliant, not secure: the effort to meet PCI Level 1 guidelines reveals a new security mantra to our manager

3. Money talks when you need to get things done

4. The perils of single sign-on

5. Security manager's journal of black hat and training: our manager digs deep into the issues at the hacker expo, then he tackles security awareness training back at the office

6. Security Manager's Journal: spotting vulnerabilities takes many eyes

7. Taking our breach response plan for a test-drive: our manager upgrades his company's incident response plan and gets ready to test it with all the people who will need to take action should a real breach ever hit

8. Taking a gander at the security landscape: as our manager settles in at his new job, he has begun to see security vulnerabilities everywhere he looks

9. Management Software Hits Integration Snag

10. Authentication Rollout Turns Into Control Issue

11. ThisWeek'sGlossary

12. Links

13. What Do You Do When You're Nipped by Nimda?

14. Virus Attacks Can Enter Through Many Doors

15. Tech - Features

16. Vulnerability Draws Yawn From Operations

17. Making the Airwaves Safe For Corporate E-Mail Users

18. Glossary and Links

19. Security Certification: It's Worth the Effort

20. Security Manager's Bookshelf, Links

21. Terrorist Worries Force Top-Down Security Review

22. ThisWeek'sGlossary

23. VPN Security Review Moves To the Front Burner

24. Security Review Gets No Respect From Managers

25. Security Manager's Visit to Def Con Is an Eye-Opener

26. Undocumented Network Hides Vulnerabilities

27. Big Firm's Security Gets Large-Scale Overhaul

28. Even Security Managers Get the Dot-com Blues

29. What to Do When the Feds Come Knocking

30. On the Trail of an Elusive Trojan Horse

31. Server Lockdown Locks Out End Users

32. Security Manager Initiates Friendly Fire

33. When Good Security Leads to Poor Performance

34. Zen and the Art of Intrusion Detection

35. 'I Hired a Hacker': A Security Manager's Confession

36. New Security Manager Starting at Ground Zero

37. Locking down the network our manager decides that, like users, resources on the network should adhere to the rule of least privilege

38. The heartburn of Heartbleed: our manager scrambles to find and fix any vulnerable resources after the OpenSSL flaw is discovered

39. A deal too good to be true: offshore coding vendor offers a great price for quality work, but it may be stealing the company's source code

40. Virtual machines, real mess: when internet and phone service goes down, the problem is traced to VM images installed in a classroom

41. Security managers journal: Vendors Can Make Us a Target The data breach suffered by Target could make It easier te make some needed changes at our manager's conrnm

42. Who's calling, please? An open port results in thousands of dollars in charges for international calls. Management hates that sort of thing

43. Eyes wide open on data loss: combining existing network data loss prevention with endpoint DLP will reveal more hidden network recesses

44. Security managers journal: siccing MDM on personal devices their use has gotten out of control. and mobile device managemer. will play we with deployed NAC

45. Server surfing is a big no-no: how could a tightly restricted server in finance be compromised by malware? Really it's not that hard

46. It's policy-tweaking time: no policy, no matter how well crafted, is immune from periodic review. Fall is when our manager tackles that

47. Found: servers that shouldn't be: they're Internet-facing, unpatched machines with no malware protection. How could that ever happen?

49. Email change opens many holes: migration to a new email platform wouldn't alter any of the security settings, our manager was assured. Wrong!

50. Security manager's journal: a cheap date for 2014 budget neither of our manger's two top security priorities for the coming year will break the bank

Catalog

Books, media, physical & digital resources