Lyne Bourque - Article Archives - Page 1

Mac OS X Security for Administrators: Lockdown

January 19, 2009
Learn how some command line tricks and time with the handy nmap tool can help you secure those Macs that have been steadily trickling into your office.
READ MORE

Honing Computer Forensics Skills with Process Explorer

December 29, 2008
Need to cleanse a malware infected Windows system? Learning to use a free and handy tool called Process Explorer is an essential first step.
READ MORE

Honing Computer Forensics Skills with Process Explorer

December 24, 2008
Need to cleanse a malware infected Windows system? Learning to use a free and handy tool called Process Explorer is an essential first step.
READ MORE

Five Essential Computer Forensics Tools

November 26, 2008
Cost-effective tools that determine if your systems are under attack, leaking sensitive data or both.
READ MORE

Five Essential Computer Forensics Tools

November 21, 2008
Cost-effective tools that determine if your systems are under attack, leaking sensitive data or both.
READ MORE

Ten Back to School Security Tips for Administrators

August 27, 2008
Soon students and faculty will put many schools' IT departments to the test. Schools (and businesses, too) can take steps to keep their users and their data safe.
READ MORE

Adding Voltage for Secure Databases

July 1, 2008
The encryption options are plentiful but good luck finding a way to appease your DBAs. Voltage employs some clever tricks for minimizing shocks to the system.
READ MORE

The Stewards of Online Reputation

May 27, 2008
Secure Computing's technology helps you determine your online reputation and make it harder for online criminals to undo years of hard work.
READ MORE

Smartphones: Pocketable Endpoints or Network Backdoor?

March 31, 2008
Both actually. When evaluating endpoint security, don't neglect the "backdoor" some malware pushers are targeting.
READ MORE

IT Belt Tightening? Don't Let Security Suffer

March 3, 2008
If you think tighter budgets are a pain, remember that spammers, malware coders and gadget-packing insiders have little regard for your financial situation. The good news is that you already possess the tools to thwart them.
READ MORE

CSI Survey 2007, Part 3: Tech and Tribulations

December 31, 2007
In this final part of the series, we examine the security technologies companies employ to protect their networks. That is, when they even bother...
READ MORE

CSI Survey 2007, Part 2: Meat and Potatoes

November 26, 2007
In Part 2, we get to the juicy part. The good news is that attacks are down this year. The bad news? Insider abuse and targeted threats abound.
READ MORE

CSI Survey 2007: Lay of the Land

October 29, 2007
This year's security survey yields insight on the corporate landscape in terms of privacy and spending. Plus, it reveals at least one IT function that is bucking the outsourcing trend.
READ MORE

Rugged Security: MESHnet Firewall

September 29, 2007
Two firms team for a portable, military-grade hardware firewall that will take whatever hackers -- or Mother Earth, for that matter -- can dish out. Plus, it looks the part.
READ MORE

Ready to Weather out the Rising Storms?

March 20, 2007
The forecast? Spammy, with a chance of multiprotocol attacks. But there is promising new technology that provides some needed network weatherproofing.
READ MORE

Security's Human Element

February 2, 2007
All the technology in the world is useless against threats that prey on human foibles.
READ MORE

2006 CSI/FBI Survery, Part 2

August 17, 2006
It would stand to reason that organizations are learning from their past troubles by now. Then why are they getting smacked around by the same old security issues?
READ MORE

2006 CSI/FBI Survey, Part 1

July 27, 2006
Twelve months and some high-profile security breaches later, has anything changed? A look at this year's results and whether businesses have learned their lesson.
READ MORE

Post-Encryption Security

June 2, 2006
Encryption sure helps, but once decrypted, what's to keep your sensitive data from flying the coop? SealedMedia plugs the screenshot/cut-and-paste hole.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|