Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

2010 Year in Review by CEO Kevin Hickey

Kevin Hickey, CEO of eEye Digital Security, addresses customers, partners, and prospects with a year-end review of 2010. First, he announces the launch of the new Retina CS 2.0 solution and covers what eEye promised at the beginning of the year and what they delivered, then introduces you to where the company is headed in…

Post by Kevin Hickey December 7, 2010
, , ,

How Much is Goldman’s Code Worth?

The trial of a former Goldman Sachs programmer accused of stealing source code to take to a competitor has begun in somewhat of a public spectacle. The Wall Street Journal unveiled some particularly interesting details. For example, the programmer was one of the highest paid in the company with a $400,000 annual salary, but competitor Teza Technologies offered him over $1 million in total pay including a $700,000 bonus.

Post by Peter McCalister December 6, 2010
broken chain

WikiLeaks Debacle Points to Least Privilege Weakest Link

We’re used to the media getting side tracked by the content of data breach stories, rather than how they happened, as other posts here have regularly noted.

Post by Peter McCalister December 3, 2010
guy laptop

Calculating Your ROI For Least Privilege

So you’ve decided to implement a privilege identity management solution because you’ve realized that a least privilege environment is a perfect way to eliminate the misuse of privilege from your corporation, help satisfy ever changing governance mandates and deliver on-demand reporting entitlement reports and keystroke logs to auditors when required.

Post by Peter McCalister December 2, 2010
Break in

Privilege Identity Management Ensures Governance Mandates

Corporate governance ensures accountability across the extended enterprise. It facilitates staying competitive and satisfying ever changing government regulations while providing mechanisms and controls to reduce the inefficiencies that arise when individuals misuse privileges granted to them.

Post by Peter McCalister December 1, 2010

Top 10 Reasons To Use Licensed Software Vs Freeware

In the spirit of keeping blog posts informative, short and fun, this one takes a cue from David Letterman in format. So without further fanfare or wasted space… the Top 10 Reasons To Use Licensed Software Vs Freeware are:

Post by Peter McCalister November 30, 2010
Guy PC

More Collaboration Needed For IT Governance and Compliance

In a new survey conducted by Unisphere Research, results showed that even as many Database Administrators (DBAs) are willing to assume much needed security practices in their daily duties, there is an overwhelming communication disconnect between these data managers and the security and executive leadership responsible for the data security at the end of the day.

Post by Peter McCalister November 29, 2010
ipad pic

Mobile Workers Require Setting Boundaries vs Building Walls

Although corporate networks today are increasingly open to subcontractors, partners or affiliates, or simply a workforce on the move, the tendency is still to think of security in the same way castles were defended in the middle ages, by building bigger walls – higher, wider and with more built in obstacles.

Post by Peter McCalister November 24, 2010

RIP Section 179 Benefits on December 31, 2010

The Economic Stimulus Act of 2008, which was extended to 2009 and 2010, is now coming to an end this year and the associated benefits with Section 179 will also be lost to businesses. Section 179 of the IRS tax code encourages businesses to buy equipment/software and invest in themselves to help spur our economy.

Post by Peter McCalister November 23, 2010

Can Eliminating Admin Rights Reduce My Virus Protection Problems?

So you’ve invested heavily in antivirus software but still seem to have to deal with the latest viruses, trojans, ransomware until your AV provider can can formulate and download the cure. The question that should be top of mind is whether or not there is a way to prevent or at least limit malware from ever even entering your IT environment?

Post by Peter McCalister November 22, 2010