Welcome!


Vol: 2 Iss: 2

Read Back Issues

For the better part of a decade now, companies have been buying defensive security technologies to secure their IT networks by identifying, defining, and then blocking the threats. By constantly updating a 'blacklist' of things that should be barricaded outside of the network, security...
Now that storage professionals are obliged to know more about security and security professionals have to know more about storage, Information Storage + Security Journal is coming into its own just as we knew it would. All the articles in ISSJ are written by acknowledged experts in the...
Today's security threats have become increasingly sophisticated and often combine several types of technology to maximize their impact on organizations. Even though businesses can't always prevent hardware damage from disasters like fires and hurricanes, they can protect data and infor...
As wireless use increases, companies that deploy corporate Wireless Local Area Networks (WLANs) open new dimensions of security vulnerability. Clearly, these companies need to address wireless security management as part of their overall security policies and architecture.
For IT managers, consolidating all the corporate data in a single storage infrastructure at the data center is the easiest, most cost-effective way to manage and protect the data. To branchoffice users, WANs delay access to the centralized data and make a consolidated infrastructure un...
This article is an excerpt from Risk Management for Computer Security: Protecting Your Network & Information Assets. Printed with permission from Butterworth-Heinemann, a division of Elsevier. Copyright 2005. For more information about this book and other similar titles, please visit ...
Companies implementing Voice-over-IP (VoIP) technologies to cut communications costs shouldn't overlook the security risks associated with a converged voice and data network. Tempted by the thought of lower phone bills, centralized management and rapid deployment, VoIP security and net...
Information Lifecycle Management (ILM) is a complex, cross-functional, and interdepartmental strategy, a set of practices for managing the storing, access, and protection of business information in alignment with service-level and cost-of-ownership objectives. A successful ILM foundati...
The Internet is now indispensable to business at the cost of Internet abuse. Spam cascaded from an annoying trickle to a raging flood of ads, viruses, spyware, and phishing scams that pour into millions of inboxes everyday all over the world. With upwards of 80% of all e-mail traffic n...
Antonio Marcelli killed people for a living. At least a few he admitted to. The feds caught him, he turned state's evidence, testified in open court against the capos and subsequently entered the witness protection program. He was safe until his new name and location hit the Internet.