Six ways to protect your systems in a merger

Tuesday, 16 January 2007, 4:04 PM EST

Mergers and acquisitions present extra challenges for IT network security. Inevitably a merger combines security organizations with different security philosophies, policies, technologies and needs. "If one company has a policy that all security needs to stay in-house, and the other has outsourced its security apparatus, obviously they have a conflict," says Chris Ellerman, national security practice director at Dimension Data North America.

At Computerworld.

[ Read more ]




Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //