Enterprise IT Watch Blog:


February 14, 2011  9:54 AM

Lenovo and WinMagic offer up new Full-Disk Encryption (FDE) management options

Posted by: Michael Morisy
Cloud security, RSA, RSA 2011, Security

As the Trusted Computing Group's Opal security standard...

February 3, 2011  3:38 PM

IT Security: Oversharing in the Forums?

Posted by: MelanieYarbrough

Member Batye recently...

February 1, 2011  9:22 AM

Securing your cloud the Facebook way

Posted by: Michael Morisy
Cloud security, Facebook, Security

While cloud computing isn't necessarily moving IT security into uncharted waters, it is highlighting some old vulnerabilities that many organizations just never got around to patching up, from shoddy encryption practices to allowed poor user practices. Leading the way, in both stumbles and...

December 15, 2010  12:05 PM

Member Guide: Server hardening tips & tricks

Posted by: MelanieYarbrough
Member Guides, Network security, Security, Servers

It's always fun to get new things, but before you go plugging all those enterprise holiday...

November 30, 2010  9:59 AM

Google Cache is the new WikiLeaks

Posted by: Michael Morisy

While WikiLeaks has been garnering headlines for leaking tens of thousands of pages of sensitive documents, there's a quieter...

November 22, 2010  6:21 AM

Start from scratch: Data center security policy template

Posted by: Kevin Beaver
Data Center, Data Center in 2010, Kevin Beaver, Security

Security policies are all too often made to be overly-complex and difficult to manage. Done incorrectly,  policies can hinder more than they help....

November 19, 2010  6:23 AM

Data centers are fair game for policies, too

Posted by: Kevin Beaver
Data Center, Data Center in 2010, Kevin Beaver, Security

When we think of security policies, visions of "acceptable use" and "passwords" often come to mind. But policies are much more than that - especially considering the complexities associated with data centers. Policies outline this is how we do things around here regardless of the specific...

November 17, 2010  8:36 AM

Who exactly is responsible for data center security?

Posted by: Kevin Beaver
Data Center, Data Center in 2010, Kevin Beaver, Security

Given our discussion of data centers this month, I reflected back on the data center environments I've seen over the past few years and have drawn some interesting conclusions regarding security in/around the data center: 1. Sometimes the physical security team owns the...

September 22, 2010  3:21 PM

Stop fearing your smartphone: Mobile encryption & your security policy

Posted by: MelanieYarbrough
BlackBerry, iPhone, Mobile Encryption, Security, Security in 2010

Bookmark and Share     0 Comments     RSS Feed     Email a friend

September 16, 2010  8:36 AM

The Seven Deadly Enterprise Security Sins, Part II

Posted by: Michael Morisy
Security, Windows 7, Windows 7 in 2010

Last week, the IT Watch Blog took a look at the first three of the Seven Deadly Security Sins. Today, we reveal the other transgressions that are costing companies millions of...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: