-----BEGIN ENCRYPTED MESSAGE-----
Jun 22, 2009, 12:01 (0 Talkback[s])
(Other stories by David Lane)
WEBINAR:
On-Demand
How to Help Your Business Become an AI Early Adopter
"Despite this, most of us who work in those fields are expected
to not only know about them, but understand the security
ramifications behind them. This gets to be even more complicated
when you have to take into account that a number of the systems
that are part of HIPAA or PCI based purchases are connected to the
web.
"We can pretty much all agree that web servers, regardless of
the underlying OS, are vulnerable to attack. Further, we can also
agree that once breached, there is a gold mine of data behind these
web servers that the bad guys are just salivating to get their
hands on. What most people forget, or more correctly seem to over
look, is that the majority of data breaches in the United States in
recent memory have not been from the outside in, but from the
inside out. As architects and administrators, security specialists
and day-to-day users, it is our responsibility to ensure that the
data we use daily in our jobs is stored as securely and as safely
as possible."
Complete
Story
Related Stories:
- Researchers Build Anonymous, Browser-Based 'Darknet'(Jun 16, 2009)
- Walsh: Introducing the SELinux Sandbox(May 27, 2009)
- Disk Encryption With TrueCrypt(May 20, 2009)
- Zeroshell Linux: Captive Portal, Internet Gateway and Router(May 18, 2009)
- Tor on Ubuntu 9.04(May 05, 2009)
- E-mail Encryption With GPG and Thunderbird(Apr 21, 2009)
- 10 security threats to watch out for in 2009(Mar 26, 2009)
- Designing a Linux PAM login security application(Mar 11, 2009)
- How-To: Compile Programs From Source in Linux(Mar 11, 2009)
- Virtual Private Network and OpenVPN(Feb 27, 2009)