Archive for August, 2008

What we’re reading, week of 8/25

Posted: 25th August 2008 by VPN Haus in Highlights

From Endpoint-Security.Info… Insider Compromises 2 million Private Records Agent Smith examines the tale of Countrywide Financial Corp., and an insider who sold customer information to competitors over the course of three years. Could Countrywide have prevented this by updating their security practices to include monitoring data transfers to portable devices? From Network Security Blog… Force [...]

What we're reading, week of 8/25

Posted: 25th August 2008 by VPN Haus in Highlights

From Endpoint-Security.Info… Insider Compromises 2 million Private Records Agent Smith examines the tale of Countrywide Financial Corp., and an insider who sold customer information to competitors over the course of three years. Could Countrywide have prevented this by updating their security practices to include monitoring data transfers to portable devices? From Network Security Blog… Force [...]

NAC: the good, the bad, the unnecessary?

Posted: 22nd August 2008 by VPN Haus in Endpoint Management, Posts

We’re interested in getting readers’ opinions on NAC. For those who have taken it on in their organizations, what have you found to be the real advantages? Has NAC had a positive influence on your organization beyond what could be expected from adopting any other set of standards? Have you implemented associated tools, technologies, or [...]

More thoughts on LogMeIn

Posted: 20th August 2008 by VPN Haus in Posts, Rethink Remote Access

Last week we posted in response to this Download.com article about LogMeIn – a remote access utility that the author claims could replace his VPN. We decided to pose the question to industry peers using LinkedIn’s Q&A feature. We asked: Anyone using LogMeIn for Windows and Mac? CNET writer, Seth, posted something on his experience [...]

What we're reading, week of 8/18

Posted: 18th August 2008 by VPN Haus in Highlights

From 360 Degree Security… Competitors Can Be Civil Tyler Reguly reflects on recent experiences at Blackhat and DEFCON, and discusses how competitive vendors in the security space find common ground.   From Emergent Chaos… Certifiably Silly Adam Shostack discusses the failings of SSL in a response to a post by Michael Barrett about Firefox 3.0 [...]