How do you share data with your business partners? Email attachments? Microsoft SharePoint sites? FTP? Purchased solution over leased lines? Many methods are available, but it's increasingly important to ensure that...
The biggest story of the RSA Conference 2008 meeting of security professionals yesterday (opening day) was Department of Homeland Security Secretary Michael Chertoff's keynote address. He said that enhancing cybersec...
In this Issue --Perspective: Moving Toward Self-Encrypting Drives Everywhere --Coming this Month --March 2008 Articles in Print-Friendly Format—with Bonus Article on Security Logging --Share Your Security Tips...
Last month, I wrote about a disk encryption vulnerability in "Keep Your Encrypted Data Encrypted." This month, more disk encryption news—of a more positive sort. Seagate Technology will soon announce what it calls a...
Role-based entitlement management--that's the function that The Dot Net Factory says its EmpowerID 4.0 software suite performs. That sounds to me like role-based access control, perhaps a more-familiar term. Whatever...
Are you getting the most out of your security cameras? Even if you have trained observers monitoring your cameras 24 hours a day, you could do better, says Kevin Shahbazi, CEO of Avocado Security. The young company is...
Here's a spam filter with a different approach--it looks at the recipient to determine whether a message is spam. Abaca Technology's ReceiverNet service examines the header of each email message that passes through...