Dennis Szerszen,

Recent articles by Dennis Szerszen,

Four steps to guard against data leakage from the endpoint

Four steps to guard against data leakage from the endpoint

The influx of inexpensive storage media — from MP3 players and PDAs to USB thumb drives and external hard drives — in today's enterprise facilitates the dissemination of information further and further away from the enterprise core, and attackers are writing increasingly complex, customised malicious code designed to compromise a company's proprietary information.
Dennis Szerszen, May 7 2007 5:11PM Security

Log In

  |  Forgot your password?