Jacqueline Emigh - Article Archives - Page 1

Astaro Claims First Anti-Spyware Firewall

March 15, 2005
Astaro, a specialist in Linux-driven integrated security, has rolled out a product touted as the first on any operating system to combine network firewall protection with an anti-spyware gateway.

Linux Security: Tips from the Experts

October 29, 2003
Concerned about the security of your Linux environment or looking for ways to beef up your existing security? Two Linux security pros share tips to help you get up to speed on the latest Linux security advancements.

802.11 Hotspots Just the Start - More Wireless Management Scenarios on the Horizon

September 30, 2003
Enterprises and network administrators are starting to face an increasing number of new remote access and management scenarios beyond the ever-present need to secure corporate laptops at public hotspots.

In the Year 2005, Will Your Anti-Spam Arsenal Be the Same?

March 24, 2003
A couple of years from now, will you still be relying on the same anti-spam strategy you're using today? Jacqueline Emigh takes a look at the anti-spam scene as it stands today and reveals where it appears to be headed in the near future.

Picking Your Anti-Spam Poison: The Spam Series, Part 2

March 17, 2003
The onslaught of spam is spawning a growing spate of solutions, but which approach to fighting spam is best for your organization? Join Jacqueline Emigh as she reveals the pros and cons of the various host-based services, hardware appliances, and software gateways currently available for combating spam.

Stomping Out Spam: The Spam Series, Part 1

March 10, 2003
The onslaught of spam is spawning a growing spate of solutions. Join Jacqueline Emigh as she delves into the issue of how spam proliferates so quickly, and why it's driving administrators to deploy anti-spam products in droves.

Global Internet 'Early Warning System' on the Way

March 4, 2003
About three weeks from now, Matrix NetSystems and a still unnamed partner will launch a global Internet 'early warning system' aimed at alerting customers to cyberattacks in plenty of time to fend off damage. Meanwhile, Jacqueline Emigh reports the new Internet management service provider has just inked a deal with netVmg, developer of a solution for routing traffic across ISP links according to specified enterprise policies.

The 411 on Digital Forensics

February 6, 2003
Jacqueline Emigh undresses the sexy part of the computer security world in tackling the somewhat ambiguous term 'Digital Forensics.'

Lotus Cranks Up Notes & Domino Security

November 5, 2002
Lotus' latest Notes and Domino release boosts spam-fighting and security measures including smartcard support and mail encryption. Jacqueline Emigh covers what's new.

Security Wars: Can Intrusion Detection Even The Score?

July 12, 2002
Intrusion detection systems provide reams of raw data, and plenty of false alarms. How do you assess an IDS, where do you use one, and when does a human need to step in and make sense of what it's telling you?

Biometric Security - From Fingers To Faces

July 1, 2002
Gummy fingerprints aside, biometric security has its share of potential issues, including end-user resistance to potential privacy threats and methods that seem invasive.

Security Policies - Not Yet As Common As You'd Think

June 20, 2002
Some studies show nearly half of surveyed IT executives have no formal security policy in place. Why are many in the industry running in place when it comes to security?

Information Sharing - Reactions Are Mixed to Government Overtures

June 17, 2002
While the Federal government pushes companies to share information on security practices and incidents, some in the private sector are unsure of the benefits and nervous about disclosure requirements.

Limiting Risks in Corporate Wireless Networks

April 19, 2002
With wireless hubs an entry point for enterprise security risks, it's imperative to adopt policies and security measures that limit the chances your network will be compromised.

A Push For New Security Benchmarks

April 15, 2002
The Center for Internet Security hopes to ease enterprise policy compliance with a new suite of security benchmarks that brings cut-and-paste simplicity to network device configuration.