Red Tape

Tue
10
Nov

DICOM Security in Healthcare IT

Contributed by Ryan Daley

Mon
09
Nov

Disgruntled employees and Intellectual Property Protection

Contributed by Dan Morrill

The greatest knowledge is knowing what intellectual property you own, and where it is located on the network. The next greatest knowledge to know is what controls, technology and processes stand between that data and both insiders and outsiders. The way that intellectual property theft happens can come along a number of various tangents. However, the disgruntled employee is fast becoming the avenue of choice for loosing intellectual property. There is at least one excellent example, in the Sony DRM root kit that could provide a viable avenue for the disgruntled employee to take advantage of the network, and its computing systems.

This document is in PDF format. To view it click here.

Fri
06
Nov

System Audit: Looking for Ways to Control Security Issues

Contributed by John W. McClain

Tue
03
Nov

PCI Compliance: Is it Enough?

Contributed by Shannon Hensley

On Dec. 19, 2013 the following message was released from Target Stores: “We wanted to make you aware of unauthorized access to Target payment card data. The unauthorized access may impact guests who made credit or debit card purchases in our U.S. stores from Nov. 27 to Dec. 15, 2013. Your trust is a top priority for Target, and we deeply regret the inconvenience this may cause. The privacy and protection of our guests’ information is a matter we take very seriously and we have worked swiftly to resolve the incident."

This document is in PDF format. To view it click here.

Fri
30
Oct

Desktop Security Policy Enforcement - How to secure your corporate mobile devices

Contributed by Jason S. Meyer

Pages

Subscribe to RSS - Red Tape