Articles by Jacqueline Emigh 

Astaro Claims First Anti-Spyware Firewall

Astaro, a specialist in Linux-driven integrated security, has rolled out a product touted as the first on any operating system to combine network firewall protection with an anti-spyware gateway.

Linux Security: Tips from the Experts

Concerned about the security of your Linux environment or looking for ways to beef up your existing security? Two Linux security pros share tips to help you get up to speed on the latest Linux security advancements.

802.11 Hotspots Just the Start - More Wireless Management Scenarios on the Horizon

Enterprises and network administrators are starting to face an increasing number of new remote access and management scenarios beyond the ever-present need to secure corporate laptops at public hotspots.

In the Year 2005, Will Your Anti-Spam Arsenal Be the Same?

A couple of years from now, will you still be relying on the same anti-spam strategy you're using today? Jacqueline Emigh takes a look at the anti-spam scene as it stands today and reveals where it appears to be headed in the near future.

Picking Your Anti-Spam Poison: The Spam Series, Part 2

The onslaught of spam is spawning a growing spate of solutions, but which approach to fighting spam is best for your organization? Join Jacqueline Emigh as she reveals the pros and cons of the various host-based services, hardware appliances, and software gateways currently available for combating spam.

Stomping Out Spam: The Spam Series, Part 1

The onslaught of spam is spawning a growing spate of solutions. Join Jacqueline Emigh as she delves into the issue of how spam proliferates so quickly, and why it's driving administrators to deploy anti-spam products in droves.

Global Internet 'Early Warning System' on the Way

About three weeks from now, Matrix NetSystems and a still unnamed partner will launch a global Internet 'early warning system' aimed at alerting customers to cyberattacks in plenty of time to fend off damage. Meanwhile, Jacqueline Emigh reports the new Internet management service provider has just inked a deal with netVmg, developer of a solution for routing traffic across ISP links according to specified enterprise policies.

The 411 on Digital Forensics

Jacqueline Emigh undresses the sexy part of the computer security world in tackling the somewhat ambiguous term 'Digital Forensics.'

Lotus Cranks Up Notes & Domino Security

Lotus' latest Notes and Domino release boosts spam-fighting and security measures including smartcard support and mail encryption. Jacqueline Emigh covers what's new.

Security Wars: Can Intrusion Detection Even The Score?

Intrusion detection systems provide reams of raw data, and plenty of false alarms. How do you assess an IDS, where do you use one, and when does a human need to step in and make sense of what it's telling you?

Biometric Security - From Fingers To Faces

Gummy fingerprints aside, biometric security has its share of potential issues, including end-user resistance to potential privacy threats and methods that seem invasive.

Security Policies - Not Yet As Common As You'd Think

Some studies show nearly half of surveyed IT executives have no formal security policy in place. Why are many in the industry running in place when it comes to security?

Information Sharing - Reactions Are Mixed to Government Overtures

While the Federal government pushes companies to share information on security practices and incidents, some in the private sector are unsure of the benefits and nervous about disclosure requirements.

Limiting Risks in Corporate Wireless Networks

With wireless hubs an entry point for enterprise security risks, it's imperative to adopt policies and security measures that limit the chances your network will be compromised.

A Push For New Security Benchmarks

The Center for Internet Security hopes to ease enterprise policy compliance with a new suite of security benchmarks that brings cut-and-paste simplicity to network device configuration.

When Users Jeopardize Network Security

Try as you might, you just can't stop users from opening virus-ridden e-mail attachments, or compromising security in other ways. What to do about it?