Enterprise IT Watch Blog:

Security


February 14, 2011  9:54 AM

Lenovo and WinMagic offer up new Full-Disk Encryption (FDE) management options



Posted by: Michael Morisy
Cloud security, RSA, RSA 2011, Security

As the Trusted Computing Group's Opal security standard...

February 3, 2011  3:38 PM

IT Security: Oversharing in the Forums?



Posted by: MelanieYarbrough
Security

Member Batye recently...


February 1, 2011  9:22 AM

Securing your cloud the Facebook way



Posted by: Michael Morisy
Cloud security, Facebook, Security

While cloud computing isn't necessarily moving IT security into uncharted waters, it is highlighting some old vulnerabilities that many organizations just never got around to patching up, from shoddy encryption practices to allowed poor user practices. Leading the way, in both stumbles and...


December 15, 2010  12:05 PM

Member Guide: Server hardening tips & tricks



Posted by: MelanieYarbrough
Member Guides, Network security, Security, Servers

It's always fun to get new things, but before you go plugging all those enterprise holiday...


November 30, 2010  9:59 AM

Google Cache is the new WikiLeaks



Posted by: Michael Morisy
Security

While WikiLeaks has been garnering headlines for leaking tens of thousands of pages of sensitive documents, there's a quieter...


November 22, 2010  6:21 AM

Start from scratch: Data center security policy template



Posted by: Kevin Beaver
Data Center, Data Center in 2010, Kevin Beaver, Security

Security policies are all too often made to be overly-complex and difficult to manage. Done incorrectly,  policies can hinder more than they help....


November 19, 2010  6:23 AM

Data centers are fair game for policies, too



Posted by: Kevin Beaver
Data Center, Data Center in 2010, Kevin Beaver, Security

When we think of security policies, visions of "acceptable use" and "passwords" often come to mind. But policies are much more than that - especially considering the complexities associated with data centers. Policies outline this is how we do things around here regardless of the specific...


November 17, 2010  8:36 AM

Who exactly is responsible for data center security?



Posted by: Kevin Beaver
Data Center, Data Center in 2010, Kevin Beaver, Security

Given our discussion of data centers this month, I reflected back on the data center environments I've seen over the past few years and have drawn some interesting conclusions regarding security in/around the data center: 1. Sometimes the physical security team owns the...


September 22, 2010  3:21 PM

Stop fearing your smartphone: Mobile encryption & your security policy



Posted by: MelanieYarbrough
BlackBerry, iPhone, Mobile Encryption, Security, Security in 2010

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 16, 2010  8:36 AM

The Seven Deadly Enterprise Security Sins, Part II



Posted by: Michael Morisy
Security, Windows 7, Windows 7 in 2010

Last week, the IT Watch Blog took a look at the first three of the Seven Deadly Security Sins. Today, we reveal the other transgressions that are costing companies millions of...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: