January 16th, 2008
By Chad Perrin
Spam is unsolicited bulk emailing, generally for commercial advertising purposes. It is the electronic equivalent of the junk mail you get from credit card compan READ MORE http://blogs.techrepublic.com.com/security/...
Maybe you're a sole proprietor or a home computer user, answerable to nobody but yourself for security policy. If you have to answer to others, though, you need to know more than good security practic READ MORE http://blogs.techrepublic.com.com/security/...
A fellow IT pro said that you should never need to run a virus scan on a PC because most antivirus packages scan the system in real time anyway. Is this true?
September 29th, 2008
By Brad Bird
READ MORE http://blogs.techrepublic.com.com/security/...
A smart administrator will protect IT resources not only from the outside world, but from other resources inside the network as well.
December 30th, 2008
By Chad Perrin
A layered approach to se READ MORE http://blogs.techrepublic.com.com/security/...
What are "layered security" and "defense in depth" and how can they be employed to better protect your IT resources? Understanding these strategies and how they can be used to improve your own securit READ MORE http://blogs.techrepublic.com.com/security/...
Chad Perrin reinforces his argument that obscurity is not security by defending open source security solutions against claims that it is inherently more vulnerable.
March 28th, 2008
By Chad Perrin READ MORE http://blogs.techrepublic.com.com/security/...