User activity monitoring answers the age-old questions of who, what and when |
- User activity monitoring answers the age-old questions of who, what and when
- 52 percent of firms have no IT security guidelines for staff
- Google fixes Street View as German launch continues
- Adobe Reader X Makes PDF Files Safer
- Intellect calls for private, public cybersecurity deal
- Adobe launches 'sandboxed' Reader X
- Wiseguy scalpers bought tickets with CAPTCHA-busting botnet
- Apple patches critical 'drive-by' Safari bugs
- Watch Your Back! Snoopers are After Your Data
- Too much access? Privileged Identity Management can help
- China Hijack Raises Concerns for Internet Security
- Juniper ends busy week by acquiring video storage assets
- Smartphone and iPad-crazy enterprises playing right into Aruba Networks' hands
User activity monitoring answers the age-old questions of who, what and when Posted: 19 Nov 2010 08:00 AM PST The city of Richmond, Va., had a user access problem. Due to an inadvertent misconfiguration of Active Directory, internal users were able to access systems and databases that they shouldn't have had access to. A user activity monitoring tool helped the city see the inappropriate access and lock down their systems. |
52 percent of firms have no IT security guidelines for staff Posted: 19 Nov 2010 08:00 AM PST |
Google fixes Street View as German launch continues Posted: 19 Nov 2010 08:00 AM PST |
Adobe Reader X Makes PDF Files Safer Posted: 19 Nov 2010 08:00 AM PST |
Intellect calls for private, public cybersecurity deal Posted: 19 Nov 2010 08:00 AM PST |
Adobe launches 'sandboxed' Reader X Posted: 19 Nov 2010 08:00 AM PST |
Wiseguy scalpers bought tickets with CAPTCHA-busting botnet Posted: 19 Nov 2010 08:00 AM PST |
Apple patches critical 'drive-by' Safari bugs Posted: 18 Nov 2010 08:00 AM PST |
Watch Your Back! Snoopers are After Your Data Posted: 18 Nov 2010 08:00 AM PST Next time you're sitting at your neighborhood Starbucks surfing the Web and you get that sense that somebody is watching you--take heed. They probably are. Using a computer in public comes with the added risk that those nearby may be able to glean sensitive information by casually viewing your display over your shoulder. |
Too much access? Privileged Identity Management can help Posted: 18 Nov 2010 08:00 AM PST Privileged identity management (PIM) products automate control over administrative accounts, which typically put too much power in too many people's hands with too little accountability. They address the security, operational and compliance issues posed by the widely shared administrative accounts and passwords, excessive administrative rights, poor separation of duties, embedded passwords in legacy applications and scripts, and poor or nonexistent privileged-password rotation. They also provide individual accountability and an audit trail to prove that policies and controls are actually being enforced. |
China Hijack Raises Concerns for Internet Security Posted: 18 Nov 2010 08:00 AM PST Reports have emerged about an event earlier this year when much of the Internet traffic from around the world was temporarily hijacked--rerouted through China Telecom. China Telecom claims the incident was an accident, but regardless of intent it demonstrates that the Internet itself can be hijacked, and raises concerns over how to prevent future occurrences. |
Juniper ends busy week by acquiring video storage assets Posted: 18 Nov 2010 08:00 AM PST |
Smartphone and iPad-crazy enterprises playing right into Aruba Networks' hands Posted: 18 Nov 2010 08:00 AM PST The influx of smartphones, tablets and other wireless devices into businesses is making many employees more productive, but Aruba Networks is seeing firsthand how much strain all of this newfound mobility is putting on the enterprise IT and security staffs that are its customers. In this installment of the IDG Enterprise CEO Interview Series, IDGE Chief Content Officer John Gallant spoke with Aruba CEO Dominic Orr about the changing wired/wireless network architecture, competing with Cisco Systems, exploiting the cloud and the rise of 802.11n. |
You are subscribed to email updates from "Cisco" via Ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment