Stories by John Peters

Beyond the firewall

This year, with all of its data breaches, has certainly proved that network security is much more complex than at past times, when firewalls were viewed as premium defense collateral. What are some methods/policies I should be aware of as I look to spend time (and security budget) in 2008?

Insider threat being blown out of proportion?

I've read the recent news about intellectual property breaches at large companies and wondered if the need to protect this data is being blown out of proportion or if my company should be concerned about who has access to what on our network.