Quantcast
Channel: Computerworld - Stories by Mathias Thurman RSS feed
Browsing latest articles
Browse All 15 View Live

Security Manager's Journal: Move to hosted email opens new vulnerabilities

I took somebody's word for something, and I didn't subsequently check it out to my own satisfaction. Result: big trouble. Lesson: always verify.

View Article



Security Manager's Journal: The ins and outs of extending DLP

I love DLP! That's not a statement that would sell a chief financial officer on data leak prevention, but I can show real ROI from our deployment as well.

View Article

Security Manager's Journal: Found: 30 unmanaged servers that shouldn't be

We just found 30 servers that can't be accounted for. Thirty Internet-facing servers with no malware protection and patchy patch histories. I need to take a deep breath and figure out just how bad this...

View Article

Security Manager's Journal: Time to tweak the security policies

Every fall, I conduct a policy review. I think it's a good idea to have this on my calendar, because no policy, no matter how well crafted, is meant to last for all time. New standards arise and old...

View Article

Security Manager's Journal: An admin surfing on a server? That's a big no-no

Security incidents are a complete disruption of my normal day-to-day activities. I love them. I especially like it when they uncover systemic problems we might not otherwise have found out about. We...

View Article


Security Manager's Journal: Siccing MDM on personal mobile devices

We looked into mobile device management (MDM) in 2012, but the time didn't seem right. Now, some 18 months later, things have changed, and MDM is looking more like a good fit for us.

View Article

Security Manager's Journal: Another step toward eliminating data loss

Implementing technology to monitor user and network activity can be an eye-opener.

View Article

Security Manager's Journal: Thousands of dollars in phone calls? Management...

As a security manager, I expect my company to be hit by malware infestations, data theft, denial-of-service attacks and attempts at unauthorized access. I deal with them all as they arise, and they do...

View Article


Security Manager's Journal: Stopping vendors from making us a Target

Thank you, Target! It's a pity that security managers have to capitalize on other organizations' misfortunes to broker change within their own enterprises, but the notorious Target breach of late last...

View Article


Security Manager's Journal: Virtual machines, real mess

It started out as a simple call to the help desk from an engineer at one of our major development centers: Phone calls were being dropped. Soon, similar complaints were coming in from other engineers,...

View Article

Security Manager's Journal: A deal that's too good to be true

My company is always looking for ways to save money. One maneuver -- outsourcing the development of a module of one of our software products -- almost cost us big time.

View Article

Security Manager's Journal: Dealing with the heartburn of Heartbleed

When it was time to write this column, the only thing on my mind was the OpenSSL Heartbleed vulnerability. If you have anything to do with infosec, it was probably dominating your days as well.

View Article

Security Manager's Journal: Taking steps to better lock down the network

The resources on our network have been given too much access to the Internet, and we need to curb that.

View Article


Security Manager's Journal: A ransomware flop, thanks to security awareness

People like to ask the security manager, "What keeps you up at night?" My usual answer: "Employees." And there's good reason. About 95% of the security incidents my department responds to are a result...

View Article

Who's calling, please?

Some security weaknesses can't be found with a scan or a vulnerability assessment of the infrastructure. As a security manager, you have to keep your eyes open for things that aren't as secure as they...

View Article

Browsing latest articles
Browse All 15 View Live




Latest Images