Archive for October, 2008

What we’re reading, week of 10/27

Posted: 29th October 2008 by VPN Haus in Highlights

From Schneier on Security… Barack Obama Discusses Security Trade-Offs Bruce Schneier uses a remark from Obama to illustrate his philosophy on security systems and how to manage them: “the person in charge of the security system can’t be the person who decides what resources to devote to that security system.” From Zero Day… “Joe the [...]

What we're reading, week of 10/27

Posted: 29th October 2008 by VPN Haus in Highlights

From Schneier on Security… Barack Obama Discusses Security Trade-Offs Bruce Schneier uses a remark from Obama to illustrate his philosophy on security systems and how to manage them: “the person in charge of the security system can’t be the person who decides what resources to devote to that security system.” From Zero Day… “Joe the [...]

Biometrics for VPNs

Posted: 29th October 2008 by VPN Haus in Posts

Last week, NCP announced biometric security support for VPNs. We’re interested in hearing stories of how organizations have integrated biometric security technology with their VPNs, and how it has gone. Were there any major obstacles to implementation? Measurable improvements? New challenges this technology has created? Best practices you’d like to share? Share this:EmailFacebookPrint

Security versus compliance

Posted: 22nd October 2008 by VPN Haus in Posts

In Massachusetts, legislation has just passed on an “Order Regarding the Secuirty and Confidentialty of Personal Information.” The measures contained within are intended to hold the state’s government bodies accountable for adhering to practices that protect against consumer identity theft. Especially of interest is Section 4, which calls for the Commonwealth’s CIO to oversee the [...]

What we're reading, week of 10/20

Posted: 20th October 2008 by VPN Haus in Highlights

From WindowSecurity.com… Security in the Mobile Device Era Deb Shinder discusses the security considerations and solutions for Windows Mobile devices, as well as the challenges that arise when using non-Windows devices in a corporate mobile network. From IT Security… Vulnerability Blog Roll IT Security compiles a list of today’s most newsworthy security vulnerabilities. From Emergent [...]