Be proactive: Information Security as a Business Enabler

Thanks to Paul Vincent for contributing his article Information Security; The Business Enabler. Paul goes on to explain how information security is much more than setting every security control you can lay your hands on.

0

Information Security; The Business Enabler

By Paul Vincent Don’t get me wrong, I’m a tecchie. There was a time (and it wasn’t that long ago!) when I could name and identify the function of pretty much every Group Policy Object setting in Windows XP. However, Information Security is more than setting every security related configuration to it’s highest setting. In…

2

ID: Who do you think you are?

Thanks to Craig Murphy for contributing his article titled Who Do You Think You Are? – it’s well worth a read. He talks about identity from the perspective of a variety of vendors and applications.

0

Who do you think you are?

By Craig Murphy Actually, that’s the wrong question, I really need to know who you are, who you really are, please confirm your identity.  How are you going to tell me who you are?  I’ve got an e-mail address, send me an e-mail and I’ll reply, then you’ll know who I am because I’ve got…

1

How to make sense of anti-virus reviews

Thanks to David Harley for sharing some of his vast experience of the anti-virus industry in his article titled An Insider’s Guide to Comparative Anti-virus Reviews. David explains in detail how independant labs evaluate software and includes links and guidance for further research.    

0

Insider’s Guide to Comparative Anti-Virus Reviews

By David Harley There has been a certain amount of excitement and irritation in anti-virusresearch circles about a not-very-good comparative test of antivirusscanners that was conducted at LinuxWorld on 8th August, 2007. I was soexercised personally that I sat down and wrote a long white paper (free,gratis and unpaid by anyone) on Untangling the Wheat…

1

The wonders of Software Restriction Policies and PowerShell Code Signing

Thanks to Adrian J. Beasley for providing yet another excellent article, this one’s titled Software Restriction Policies and PowerShell Code Signing – Adrian provides a wealth of practical advice how to make the most of one of the most powerful yet under used security features of Windows XP, Server 2000, Server 2003 and Windows Vista

1

Software Restriction Policies and PowerShell Code Signing

By Adrian J. Beasley   Health Warning  Software Restriction Policies (SRPs) are extremely powerful. They also make it possible for you to foul up big-time – there is no safety barrier. For all that, they are very useful.   “With great power comes great responsibility.”   The following rules should enable you to apply this…

1

David Harley

David Harley CISSP has worked in computing since 1986, and first fellsemi-accidentally into security and antivirus research in 1989. Hisbackground includes systems, applications and network support andadministration, and includes PCs, Macs, Unix and VMS. He holdsqualifications in security auditing, ITIL service management, and medicalinformatics. Until 2006 he managed the UK National Health Service’s ThreatAssessment Centre,…

0

To secure your documents, or not, that’s the question

Adam Vero is our newest contributor. I encourage you to read his pragmatic advice for securing information is his post titled Don’t Secure Your Documents. His proactive “security as an enabler” perspective makes a refreshing read.

0