computing/enterprise-security/topics/network

Understanding Anti-Spam Laws

Understanding Anti-Spam Laws

An estimated 90 percent of all emails in mid 2010 were spam; contrast this against seven percent in 2001. To make matters worse, most of these are fraud or deceptive in nature, and may contain malware or other security risks. Anti-spam laws that try to control the menace have met limited success.
Vulnerability Scanning Methodologies

Vulnerability Scanning Methodologies

Vulnerability scanning methodologies provide IT security staff and administrators with ways to detect problems with a network before a malicious attack happens. Various types of scans and tools permit the administrator to know which vulnerabilities pose the greatest risk to the environment.
How Do You Measure Security and the Cloud?

How Do You Measure Security and the Cloud?

As the Internet has expanded to do more tasks than were ever envisioned, the latest manifestation is the Cloud. The “Cloud” is the Internet, but what makes it different is that Cloud services have a destination. You can store files or run programs. But recent events have made its security suspect.