Are security pros worrying about the right stuff?
These stories slipped through the cracks, but, if you missed them, take a quick look now.
When asked what they worry about, CSOs and CISOs cite regulatory compliance and security controls overlooked in IT projects. Some acknowledge a general angst that simply boils down to the great unknown of system-wide chaos.
But are security pros worrying about the right things? When asked this, many independent observers — former CSOs or consultants working with CSOs — offer a different perspective. They think security pros need to worry more about retaining the best staff and should be careful not to become too consumed with regulatory compliance
Read the article HERE.
10 critical physical security measures
Remember that network security starts at the physical level. All the firewalls in the world won't stop an intruder who is able to gain physical access to your network and computers, so lock up as well as lock down.
Read the article HERE.
The Basics of Virtual Private Networks
This document introduces the concept of a VPN – Virtual Private Network - and provides some initial insight into how these tools are used in the context of an overall security framework.
Read the article HERE.
Breaking into a VPN
VPN encryption is almost impossible to crack itself, so the best place to try to get into a VPN are the two end points. On the one hand, we have VPN gateways, a company's central dial-in point; on the other, the VPN client of mobile users, such as notebooks.
Read the article HERE.
When asked what they worry about, CSOs and CISOs cite regulatory compliance and security controls overlooked in IT projects. Some acknowledge a general angst that simply boils down to the great unknown of system-wide chaos.
But are security pros worrying about the right things? When asked this, many independent observers — former CSOs or consultants working with CSOs — offer a different perspective. They think security pros need to worry more about retaining the best staff and should be careful not to become too consumed with regulatory compliance
Read the article HERE.
10 critical physical security measures
Remember that network security starts at the physical level. All the firewalls in the world won't stop an intruder who is able to gain physical access to your network and computers, so lock up as well as lock down.
Read the article HERE.
The Basics of Virtual Private Networks
This document introduces the concept of a VPN – Virtual Private Network - and provides some initial insight into how these tools are used in the context of an overall security framework.
Read the article HERE.
Breaking into a VPN
VPN encryption is almost impossible to crack itself, so the best place to try to get into a VPN are the two end points. On the one hand, we have VPN gateways, a company's central dial-in point; on the other, the VPN client of mobile users, such as notebooks.
Read the article HERE.
0 Comments:
Post a Comment
<< Home