A securitypipline article caught my eye today. It is well-written and covers the need for a vulnerability assessment scanner. It is a good general survey, and goes well in enforcing some things I’ve discussed in the past, including Using Network VATs for Verification, Beyond the VA Scan, and Basic IP Router Security.
But, I wonder if the article is not a verification itself of what I said in Security Redux?
7/29/05
7/12/05
Security of Backup Data
A former collegue at Trusted Information Systems, Tommy Ward, writes, “If your company is like many others, you have put a lot of effort into securing your information systems. You’ve implemented technology and procedures at great expense, but you may be omitting an important last step: secure off-site storage.”
This is the opening to a compelling whitepaper, “Security of Backup Data.” Check it out
This is the opening to a compelling whitepaper, “Security of Backup Data.” Check it out
Labels:
security
Subscribe to:
Posts (Atom)