Intrusion Prevention Systems
Network Access Control
Endpoint Detection and Response
Data Loss Prevention
Enterprise Mobility Management
Mobile Device Management
Threat Intelligence and Analytics
Identity and Access Management
Cloud Security Best Practices
Diana Kelley - ALL ARTICLES - PAGE 1
What the Heck is DNSSEC?
February 1, 2011
DNS Security Extensions (DNSSEC) can improve the overall security of DNS, but note that there are some criticisms and caveats before you going running off and planning for full implementation of DNSSEC.
Getting Ready for PCI 2.0 Compliance
January 12, 2011
If your work for an entity that stores, processes, or transmits credit card data in electronic form, youd better be ready to comply with PCI DSS v2.0, which took effect on January 1, 2011.
Communicating Complex Security Concepts
December 29, 2010
Regardless of what kind of thinker and learner you are, its critical to present complex security concepts clearly to ensure maximum communication effectiveness with your audience.
Navigating Smartphone Liability: Corporate Liable v. Individual Liable
December 8, 2010
Personally owned, individual liable converged mobile devices are becoming commonplace in corporate environments and pose unique data protection threats.
Rethinking Privacy and Cloud Computing
November 1, 2010
A predominantly cloud-based architecture is the future for most enterprises. The question is how to best balance privacy and security with cost and business risk.
Four Key IT Security Trends for 2011
October 12, 2010
What the 2010 security acquisition spree by major players, including Symantec, HP, IBM, CA and VeriSign, could mean to IT security professionals.
Why SCADA Security Matters--And What You Should Know About It
September 2, 2010
Worst case scenarios of distributed SCADA attacks include bringing down the power grid to a major metropolitan city, yet most SCADA experts are not security experts--and vice versa.
How to Choose the Right Web Application Firewall (WAF)
August 6, 2010
An exhaustive look at all the ins and outs of shopping for a WAF. Doing the RFP work up-front will help to ensure that your organization gets the right tool for the job. Our expert tells you how.
Three Things the Oil Spill Can Teach Us About Disaster Recovery
June 23, 2010
The BP oil spill is a cautionary tale for businesses that are functioning without proper business continuity and disaster recovery processes and procedures in place.
Buying Guide for Cloud-based E-mail
June 8, 2010
We outline the key considerations for companies looking to make informed, risk-sensitive, purchasing decisions when selecting a cloud-based e-mail solution.
Measuring Software Security: BSIMM2 and Beyond
May 12, 2010
The new BSIMM2 provides the data-driven measurements that allow organizations to objectively assess their software security maturity level against their peers and themselves.
How To Set Social Networking Policies for Employees
April 20, 2010
Establishing a clear set of social networking policies is important to both the security of your business and of your employees.
How to "Green" Security Compliance
March 29, 2010
Security consultant Diana Kelley outlines several key areas where enterprises can green their security compliance programs.
Security Vendors Show Innovation at RSA
March 5, 2010
At the RSA Conference this week in San Francisco, some small vendors stood out for their innovative security solutions.
Cloud Computing Takes Center Stage at RSA 2010
March 3, 2010
At RSA, most heads are in the cloud with everyone from Symantec to IBM delivering new cloud-based security solutions.
SECURITY DAILY NEWSLETTER
GET SECURITY NEWS IN YOUR INBOX EVERY DAY
TERMS OF SERVICE
LICENSING AND REPRINTS
Copyright 2017 Quinstreet Inc. All Rights Reserved.