Nektar Therapeutics security unites teams inside—and outside—the company
Security policies and education aren't enough
Encrypting information and keys in hardware
Sneaking vulnerabilities into the enterprise through encrypted attachments pose new problems; ISPs will spend $245 million this year to combat problems, in large part because of home users.
It's not just a matter of blocking unsolicited e-mail. Today's security professionals need to protect against outbound as well as inbound problems.
Rather than navigating a Web site to see their data, customers at New York Life Investment Management Retirement Services enter only a username and password to see statements in an HTML e-mail attachment.
E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak
Proponents say IM can function as XML message brokers between systems at a fraction of the cost of traditional messaging middleware; putting an IM interface on a back-end application can bring big benefits.
Microsoft's Penny Black solution may impose fees on those sending unsolicited e-mail, while a service from Vanquish adds economic penalties for such messages.
Learn Network Storage Security Rules; Free Anti-Virus (For A Year)