What we're reading, week of 10/27

From Schneier on Security… Barack Obama Discusses Security Trade-Offs Bruce Schneier uses a remark from Obama to illustrate his philosophy on security systems and how to manage them: “the person in charge of the security system can’t be the person...

What we’re reading, week of 10/27

From Schneier on Security… Barack Obama Discusses Security Trade-Offs Bruce Schneier uses a remark from Obama to illustrate his philosophy on security systems and how to manage them: “the person in charge of the security system can’t be the person...

Biometrics for VPNs

Last week, NCP announced biometric security support for VPNs. We’re interested in hearing stories of how organizations have integrated biometric security technology with their VPNs, and how it has gone. Were there any major obstacles to implementation?...

Security versus compliance

In Massachusetts, legislation has just passed on an “Order Regarding the Secuirty and Confidentialty of Personal Information.” The measures contained within are intended to hold the state’s government bodies accountable for adhering to practices that...

What we're reading, week of 10/20

From WindowSecurity.com… Security in the Mobile Device Era Deb Shinder discusses the security considerations and solutions for Windows Mobile devices, as well as the challenges that arise when using non-Windows devices in a corporate mobile network. From IT...