
Threat Sources? Hard Questions about Focusing Your Network Protection
November 03, 2011 | POSTED BY BRETT EDGAR IN UNCATEGORIZED
The Verizon Business RISK Team released a very interesting study early in June. The study contained detailed statistical results and analysis from more than 500 forensic investigations it conducted over a four-year period (2004 to 2007), and claims to r...
READ MORE +Security really isn't Sexy? When It's Done Correctly
November 03, 2011 | POSTED BY JEFF HARRIS IN UNCATEGORIZED
I must admit, in my initial conversations with Jerry about the business of True (at the time DESA) and coming on board to manage the business, I had visions of cutting-edge technology, foreign hackers, and top secret 3-letter government agencies. So at t...
READ MORE +Protecting your Digital Assets: A Discussion on the Need for a Data Security and Data Loss Prevention Strategy
November 03, 2011 | POSTED BY JEFF HARRIS IN UNCATEGORIZED
We are pleased to have a guest writer for this month's edition of Security Notes. Written by George Schaefer, CoFounder of NexGenData, this edition of Security Notes will focus on data mining, data loss-prevention strategy, and the potential areas of conc...
READ MORE +