Security Corner:

Security policy


October 15, 2009  3:18 AM

Convert a USB Thumb Drive into a ROBAM



Posted by: Ken Harthun
ROBAM, Secure Computing, Security, Security policy, Security practice

What's a ROBAM? you ask. Check out this post: Protecting Your Business from Online Banking Fraud. SANS says, "The number one recommended...

September 30, 2009  9:43 PM

Security Maxims of a Different Breed



Posted by: Ken Harthun
cyber security, Humor, physical security, Security, Security management, Security maxim, Security policy

Search for "computer security maxims" on any of...


April 29, 2009  12:33 AM

10 Immutable Laws of Security Administration



Posted by: Ken Harthun
Secure Computing, Security, Security management, Security policy, Security practice

My last post on this subject discussed the 10 Immutable Laws of Security. This one takes the next step--also a Microsoft "archived" essay, but still relevant today. These are so self-evident that...


April 15, 2009  8:13 PM

10 Immutable Laws of Security



Posted by: Ken Harthun
Secure Computing, Security, Security management, Security policy, Security practice

I search the web constantly for security-related news and content. One day last month, I came across a series of articles on TechNet buried in the archive. Microsoft prefaces the articles with this statement: "Archived content. No warranty is made as to...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: