dcsimg

Articles by Lyne Bourque 

Mac OS X Security for Administrators: Lockdown

Learn how some command line tricks and time with the handy nmap tool can help you secure those Macs that have been steadily trickling into your office.

Honing Computer Forensics Skills with Process Explorer

Need to cleanse a malware infected Windows system? Learning to use a free and handy tool called Process Explorer is an essential first step.

Honing Computer Forensics Skills with Process Explorer

Need to cleanse a malware infected Windows system? Learning to use a free and handy tool called Process Explorer is an essential first step.

Five Essential Computer Forensics Tools

Cost-effective tools that determine if your systems are under attack, leaking sensitive data or both.

Five Essential Computer Forensics Tools

Cost-effective tools that determine if your systems are under attack, leaking sensitive data or both.

Ten Back to School Security Tips for Administrators

Soon students and faculty will put many schools' IT departments to the test. Schools (and businesses, too) can take steps to keep their users and their data safe.

Adding Voltage for Secure Databases

The encryption options are plentiful but good luck finding a way to appease your DBAs. Voltage employs some clever tricks for minimizing shocks to the system.

The Stewards of Online Reputation

Secure Computing's technology helps you determine your online reputation and make it harder for online criminals to undo years of hard work.

Smartphones: Pocketable Endpoints or Network Backdoor?

Both actually. When evaluating endpoint security, don't neglect the "backdoor" some malware pushers are targeting.

IT Belt Tightening? Don't Let Security Suffer

If you think tighter budgets are a pain, remember that spammers, malware coders and gadget-packing insiders have little regard for your financial situation. The good news is that you already possess the tools to thwart them.

CSI Survey 2007, Part 3: Tech and Tribulations

In this final part of the series, we examine the security technologies companies employ to protect their networks. That is, when they even bother...

CSI Survey 2007, Part 2: Meat and Potatoes

In Part 2, we get to the juicy part. The good news is that attacks are down this year. The bad news? Insider abuse and targeted threats abound.

CSI Survey 2007: Lay of the Land

This year's security survey yields insight on the corporate landscape in terms of privacy and spending. Plus, it reveals at least one IT function that is bucking the outsourcing trend.

Rugged Security: MESHnet Firewall

Two firms team for a portable, military-grade hardware firewall that will take whatever hackers -- or Mother Earth, for that matter -- can dish out. Plus, it looks the part.

Ready to Weather out the Rising Storms?

The forecast? Spammy, with a chance of multiprotocol attacks. But there is promising new technology that provides some needed network weatherproofing.

Security's Human Element

All the technology in the world is useless against threats that prey on human foibles.

2006 CSI/FBI Survery, Part 2

It would stand to reason that organizations are learning from their past troubles by now. Then why are they getting smacked around by the same old security issues?

2006 CSI/FBI Survey, Part 1

Twelve months and some high-profile security breaches later, has anything changed? A look at this year's results and whether businesses have learned their lesson.

Post-Encryption Security

Encryption sure helps, but once decrypted, what's to keep your sensitive data from flying the coop? SealedMedia plugs the screenshot/cut-and-paste hole.

Voltage Adds Spark to Email Security

Managing unwieldy email encryption schemes ranks high as an administrator's least favorite things to do. One security firm aims to make secure email a painless exercise.

VM Rootkits: Dangerous, in Theory

Some hackers are itching at the prospect of virtual machines to do their bidding. But for now the cards appear to be stacked against them.

Phishing Comes of Age

2005 became the year that phishing shed its amateur hour image and became a widespread and increasingly sophisticated threat.

Vulnerability Disclosure Cuts Both Ways

It seems straightforward: bug discovered, bug fixed, back to your regularly scheduled life. But like many aspects of computer security, things are rarely that simple.

2005: The Year in Enterprise Security

A look back at the trends that defined enterprise security in 2005.

2005: The Year in Enterprise Security

A look back at the trends that defined enterprise security in 2005.