IT Trenches:

information security management

1

September 16, 2009  6:31 PM

Would you click if it showed on the NY Times website? – Really would you?



Posted by: Troy Tate
ad revenue, browser security, computer network, hardware, information security, information security management, licensing, malicious software, malware, network access, PC, permit, Security, social engineering, software, user education

Yesterday Fierce CIO reported that New York Times falls victim to rogue ad. This is a trend that seems to be happening more frequently. Rogue...

May 7, 2009  7:33 PM

Is unified threat management defense in depth?



Posted by: Troy Tate
Defense in Depth, exploits, information security, information security management, Midmarket security, Security, Single Point of Failure, threats, Unified Threat Management, UTM, vulnerabilities

An ITKE poster recently asked a great question.

Experts tout unified threat management appliances as an ideal antimalware, intrusion prevention and content filtering firewall for midmarket companies. But doesn't this counter the long-standing security practice of defense-in-depth? With...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: