09/24/2007 - In Mapping Security: The Corporate Security Sourcebook for Today’s Global Economy, authors Tom Patterson and Scott Gleeson Blue offer a holistic view of what today’s chief security officers must consider when protecting corporate interests during partnerships with foreign companies.
09/24/2007 - John Bumgarner, research director for security technology with the US-CCU, says that the idea for the checklist evolved because, despite the number of industry-specific guidances (such as Sarbanes-Oxley and ISO standards), there was nothing aimed at nontechnical managers.
09/24/2007 - If you are a wireless user, you need to know just how many tools are available to compromise wireless networks. Remote-exploit.org highlights tools such as Hotspotter, which acts like a wireless hotspot so that anyone trying to connect to a legitimate network at, say, Starbucks will attach to the attacker’s access point instead. The tools can be downloaded from the Web site along with detailed tutorials—in some cases, step-by-step Flash presentations that walk users through programs that break wireless encryption protocols or that can crack passwords. The need for information on how wireless networks can be vulnerable makes Remote-exploit.org A Site to See. @ Get there via SM Online.
09/21/2007 - Software that’s built into the drive provides encryption, an e-wallet function for storing credit card numbers, and single sign-on to applications and Web sites. Data is encrypted using 256-bit AES encryption. A 4-to-40-character password is optional.