Networks

Two Factor Authentication: SMS vs. Tokens

The numbers are staggering. About 750 million airline passengers must remove their shoes every year because one lone nut, Richard Reid (now a resident of a supermax prison in Colorado), once tried t...

The Pros and Cons of Opal Compliant Drives

  Full-disk encryption (FDE) used to be a software-only proprietary solution. But over the past couple of years, a hardware based hard drive standard has emerged in...

Password Roulette: Betting on Password Storage Apps

Call Ondrej Krehel the poster boy for the password problem that is confronting all of us. Password protection on corporate servers is proving to be dangerously porous -- think Sony, Citigroup, even ...

How to Wipe a Computer Clean

  Before you sell or get rid of your computers—whether working or not—you should clean them of sensitive documents and data. To be completely safe, you should do th...

SANS Lists Top 20 Critical Vulnerabilities

Critical software vulnerabilities are increasing being found -- not in the operating system -- but in applications and major databases.The information comes out of a new quarterly report, the Top 20...

Latest articles