November 03, 2011 | POSTED BY JEFF HARRIS IN UNCATEGORIZED
Security Notes are an archive of past short security-related articles written by current and former True analysts and colleagues prior to the introduction of the True Insight blog.
Finding Your Digital Security Swing
Protecting Yo...READ MORE +
3 P's of Information Security: Perimeter
November 03, 2011 | POSTED BY JERALD DAWKINS IN UNCATEGORIZED
In my last article I briefly discussed the three key components, or the "3 P's," of information security, perimeter, people and policies. We will start this month with perimeter and how vulnerabilities exist both inside as well as outside your company.
...READ MORE +
What gets through your firewall?
November 03, 2011 | POSTED BY BRETT EDGAR IN UNCATEGORIZED
(Or: How burned is your network?)
One of my colleagues noted in an earlier article that there is a common misconception "that perimeter security alone is enough" to defend the security of a network. The most popular perimeter device is the much-hyped f...READ MORE +