Sunday, October 22, 2006

Weekend Reading

Privacy under attack, but does anybody care?

It's vanishing, but there's no consensus on what it is or what should be done. Someday a stranger will read your e-mail, rummage through your instant messages without your permission or scan the Web sites you’ve visited — maybe even find out that you read this story. Perhaps someone will casually glance through your credit card purchases or cell phone bills, or a political consultant might select you for special attention based on personal data purchased from a vendor. In fact, it’s likely some of these things have already happened to you.

Read the entire article HERE.

==================================================================
The Sexy Librarian

Talk about an interactive search engine. A new search site called
Ms.Dewey features a sultry woman who makes wisecracks related to the keywords that are typed in. The search results appear as a long, scrolling list in a window that pops up on the upper right.

Read the article HERE.

==================================================================
Security: The importance of key management

It is difficult to pick up a newspaper these days without reading about another high-profile data security breach, whether it is the loss of a laptop or a tape. Stored data is finding its way outside the corporate perimeter and into the hands of malicious individuals. The implication is clear: Data is now mobile. No longer can IT assume that important data is only stored within the confines of the glass house. It is shared with business partners, replicated to multiple data centers, and copied onto different media types that may ultimately be transferred to a third party.

There are two parts to the data security conundrum: securing data in flight and securing data at rest. Data in flight refers to the secure transfer of data from point A to point B across either a corporate network (e.g., LAN or SAN) or over the Internet. Securing data at rest entails protecting data from tampering and access while it is stored on laptops, tapes, and disk systems.

This article focuses primarily on approaches that secure data at rest. However, several of these approaches partially address the issues of securing data in flight, too.

Read the article HERE.

0 Comments:

Post a Comment

<< Home