News

Business applications

  • October 20, 2005 20 Oct'05

    Author delves into novel attack methodologies

    Review of Silence on the Wire, a book about security attack methodologies such as passive fingerprinting.

  • October 19, 2005 19 Oct'05

    Elements of a data protection strategy

    In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy.

  • September 27, 2005 27 Sep'05

    Secure your extended enterprise

    How do you achieve the fine balance between ensuring that there is truly free access to sensitive information, without sacrificing security?

  • September 26, 2005 26 Sep'05

    Secure the interests of your extended enterprise

    How do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security?

  • September 20, 2005 20 Sep'05

    SAS drives product roundup

    Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market.

  • September 18, 2005 18 Sep'05

    CCSP courses, exam changing next month

    Those seeking Cisco's security credential and specialization in VPN, firewall and IDS will soon follow different curricula that better reflect the vendor's current product lines.