Doors just stop working when one old PC in a storage closet dies.
Stories by J.F. Rice
Recent data breaches suggest that retailers are security laggards, but the professionalism of the attacks should worry just about anyone.
Cadillac or Kia? How much <a href="http://www.computerworld.com/s/topic/17/Security">security</a> is enough, and how much is too much? Can you even have too much security?
Lately, I've been struggling with trying to get resources for my <a href="http://www.computerworld.com/s/topic/17/Security">security</a> projects. As my security program continues to grow and develop, I'm at the stage where I'm rolling out new security technologies, but I'm starting to run into roadblocks when it comes to getting server, network and desktop team support. It's ironic: I got the budget I need to buy security technologies, and I bought the products, but they're not installed yet because we don't have people available to do it.
Can you believe it? As I sat down this morning to write this column, I got hit by a drive-by download of FakeAV.
Two former students at the University of Central Missouri (UCM) have been indicted by a federal grand jury on charges of breaking into university databases and of stealing and attempting to sell personal data on about 90,000 UCM students, faculty, staff and alumni. Price for the data: $35,000.
In a recent column, my Security Manager's Journal counterpart, Mathias Thurman, wrote about securing virtual desktop environments. My company is going through the same exercise of evaluating VDI as a replacement for traditional desktops. As Mathias pointed out, the concept of virtualizing the applications that run on the system does not substantially change the threat landscape, nor does it modify the countermeasures we put in place to protect against those threats.