3 P's of Information Security: Perimeter
November 03, 2011 | POSTED BY JERALD DAWKINS IN UNCATEGORIZED
In my last article I briefly discussed the three key components, or the "3 P's," of information security, perimeter, people and policies. We will start this month with perimeter and how vulnerabilities exist both inside as well as outside your company.
...READ MORE +
What gets through your firewall?
November 03, 2011 | POSTED BY BRETT EDGAR IN UNCATEGORIZED
(Or: How burned is your network?)
One of my colleagues noted in an earlier article that there is a common misconception "that perimeter security alone is enough" to defend the security of a network. The most popular perimeter device is the much-hyped f...READ MORE +
November 03, 2011 | POSTED BY DOMINIC SCHULTE IN UNCATEGORIZED
In the last Security Notes, we covered the first of the "3 P's," of information security: perimeter. This month we will introduce the second "P" - people.
One of our most frequently requested services is a penetration test. While this term has come to ...READ MORE +