2003 Survivor's Guide to Security

Monday, 16 December 2002, 11:54 AM EST

Consider stalled IT budgets and a lingering feeling of insecurity a mandate to get a handle on new security technologies and products in 2003. Of course, with vendors bombarding you with an ever-widening range of gee-whiz security gizmos, that's easier said than done.

The first step: Identify what you need to protect, from physical assets to digital data. Then consider how your applications function, what access these applications and your users need, and who will be using the information.

You're probably thinking, "Easy for you to say." Out there in the trenches, after you finish configuring your firewall, deploying your VPN, monitoring your IDS, updating your virus scanners, examining your logs, getting current on the latest vulnerabilities, keeping up with the endless stream of patches and putting out fires, there's precious little time to fine tune your security architecture.

[ Read more ]




Spotlight

How security analytics help identify and manage breaches

Posted on 30 July 2014.  |  Steve Dodson, CTO at Prelert, illustrates the importance of security analytics in today's complex security architectures, talks about the most significant challenges involved in getting usable information from massive data sets, and much more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //